[INFO] fetching crate rdma-sys 0.3.0... [INFO] checking rdma-sys-0.3.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate rdma-sys 0.3.0 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate rdma-sys 0.3.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate rdma-sys 0.3.0 [INFO] finished tweaking crates.io crate rdma-sys 0.3.0 [INFO] tweaked toml for crates.io crate rdma-sys 0.3.0 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] crate crates.io crate rdma-sys 0.3.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ad71357c5b03df00d61bf4d8f703dd2eabc77149fe016222e0aac58c732984d2 [INFO] running `Command { std: "docker" "start" "-a" "ad71357c5b03df00d61bf4d8f703dd2eabc77149fe016222e0aac58c732984d2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ad71357c5b03df00d61bf4d8f703dd2eabc77149fe016222e0aac58c732984d2", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ad71357c5b03df00d61bf4d8f703dd2eabc77149fe016222e0aac58c732984d2", kill_on_drop: false }` [INFO] [stdout] ad71357c5b03df00d61bf4d8f703dd2eabc77149fe016222e0aac58c732984d2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 81293d9989a5c458ed05079fce1efb663f073a550a333f2c38deed8d1027a09a [INFO] running `Command { std: "docker" "start" "-a" "81293d9989a5c458ed05079fce1efb663f073a550a333f2c38deed8d1027a09a", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling libc v0.2.139 [INFO] [stderr] Compiling glob v0.3.0 [INFO] [stderr] Compiling proc-macro2 v1.0.49 [INFO] [stderr] Compiling unicode-width v0.1.10 [INFO] [stderr] Compiling quote v1.0.23 [INFO] [stderr] Compiling regex-syntax v0.6.28 [INFO] [stderr] Compiling unicode-ident v1.0.6 [INFO] [stderr] Compiling bindgen v0.59.2 [INFO] [stderr] Compiling termcolor v1.1.3 [INFO] [stderr] Compiling either v1.8.0 [INFO] [stderr] Compiling memchr v2.5.0 [INFO] [stderr] Compiling log v0.4.17 [INFO] [stderr] Compiling libloading v0.7.4 [INFO] [stderr] Compiling shlex v1.1.0 [INFO] [stderr] Compiling lazy_static v1.4.0 [INFO] [stderr] Compiling memoffset v0.6.5 [INFO] [stderr] Compiling textwrap v0.11.0 [INFO] [stderr] Compiling paste v1.0.11 [INFO] [stderr] Compiling pkg-config v0.3.26 [INFO] [stderr] Compiling clang-sys v1.4.0 [INFO] [stderr] Compiling aho-corasick v0.7.20 [INFO] [stderr] Compiling nom v7.1.1 [INFO] [stderr] Compiling atty v0.2.14 [INFO] [stderr] Compiling which v4.3.0 [INFO] [stderr] Compiling clap v2.34.0 [INFO] [stderr] Compiling regex v1.7.0 [INFO] [stderr] Compiling cexpr v0.6.0 [INFO] [stderr] Compiling env_logger v0.9.3 [INFO] [stderr] Compiling rdma-sys v0.3.0 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `rdma_sys` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/opcode.rs [INFO] [stderr] * src/verbs.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:10 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:33 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:254:6 [INFO] [stderr] | [INFO] [stderr] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:272:6 [INFO] [stderr] | [INFO] [stderr] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 4 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:73841 [INFO] [stdout] | [INFO] [stdout] 3 | ...= 23 ; } extern "C" { pub fn ibv_wc_status_str (status : ibv_wc_status :: Type) -> * const :: std :: os :: raw :: c_char ; } pub mod i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:93998 [INFO] [stdout] | [INFO] [stdout] 3 | ...S : Type = 24 ; } extern "C" { pub fn ibv_rate_to_mult (rate : ibv_rate :: Type) -> :: std :: os :: raw :: c_int ; } extern "C" { pub ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:94097 [INFO] [stdout] | [INFO] [stdout] 3 | ... raw :: c_int ; } extern "C" { pub fn ibv_rate_to_mbps (rate : ibv_rate :: Type) -> :: std :: os :: raw :: c_int ; } impl ibv_srq_attr... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:185474 [INFO] [stdout] | [INFO] [stdout] 3 | ...tringify ! (wr_abort))) ; } extern "C" { pub fn ibv_qp_to_qp_ex (qp : * mut ibv_qp) -> * mut ibv_qp_ex ; } # [repr (C)] # [derive (Cop... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297561 [INFO] [stdout] | [INFO] [stdout] 3 | ...)) ; } extern "C" { pub fn ibv_get_device_list (num_devices : * mut :: std :: os :: raw :: c_int) -> * mut * mut ibv_device ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297682 [INFO] [stdout] | [INFO] [stdout] 3 | ...> * mut * mut ibv_device ; } extern "C" { pub fn ibv_free_device_list (list : * mut * mut ibv_device) ; } extern "C" { pub fn ibv_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297759 [INFO] [stdout] | [INFO] [stdout] 3 | ...evice) ; } extern "C" { pub fn ibv_get_device_name (device : * mut ibv_device) -> * const :: std :: os :: raw :: c_char ; } extern "C"... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297872 [INFO] [stdout] | [INFO] [stdout] 3 | ... :: c_char ; } extern "C" { pub fn ibv_get_device_index (device : * mut ibv_device) -> :: std :: os :: raw :: c_int ; } extern "C" { p... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297977 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: os :: raw :: c_int ; } extern "C" { pub fn ibv_get_device_guid (device : * mut ibv_device) -> __be64 ; } extern "C" { pub fn ibv_op... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298059 [INFO] [stdout] | [INFO] [stdout] 3 | ..._device) -> __be64 ; } extern "C" { pub fn ibv_open_device (device : * mut ibv_device) -> * mut ibv_context ; } extern "C" { pub fn ib... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298148 [INFO] [stdout] | [INFO] [stdout] 3 | ...ibv_context ; } extern "C" { pub fn ibv_close_device (context : * mut ibv_context) -> :: std :: os :: raw :: c_int ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298251 [INFO] [stdout] | [INFO] [stdout] 3 | ...aw :: c_int ; } extern "C" { pub fn ibv_import_device (cmd_fd : :: std :: os :: raw :: c_int) -> * mut ibv_context ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298354 [INFO] [stdout] | [INFO] [stdout] 3 | ...ibv_context ; } extern "C" { pub fn ibv_import_pd (context : * mut ibv_context , pd_handle : u32) -> * mut ibv_pd ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298456 [INFO] [stdout] | [INFO] [stdout] 3 | ...pd_handle : u32) -> * mut ibv_pd ; } extern "C" { pub fn ibv_unimport_pd (pd : * mut ibv_pd) ; } extern "C" { pub fn ibv_import_mr (pd... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298516 [INFO] [stdout] | [INFO] [stdout] 3 | ... : * mut ibv_pd) ; } extern "C" { pub fn ibv_import_mr (pd : * mut ibv_pd , mr_handle : u32) -> * mut ibv_mr ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298608 [INFO] [stdout] | [INFO] [stdout] 3 | ...mr_handle : u32) -> * mut ibv_mr ; } extern "C" { pub fn ibv_unimport_mr (mr : * mut ibv_mr) ; } extern "C" { pub fn ibv_import_dm (co... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298668 [INFO] [stdout] | [INFO] [stdout] 3 | ...mut ibv_mr) ; } extern "C" { pub fn ibv_import_dm (context : * mut ibv_context , dm_handle : u32) -> * mut ibv_dm ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298770 [INFO] [stdout] | [INFO] [stdout] 3 | ...dm_handle : u32) -> * mut ibv_dm ; } extern "C" { pub fn ibv_unimport_dm (dm : * mut ibv_dm) ; } extern "C" { pub fn ibv_get_async_eve... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298830 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_async_event (context : * mut ibv_context , event : * mut ibv_async_event) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298968 [INFO] [stdout] | [INFO] [stdout] 3 | ...td :: os :: raw :: c_int ; } extern "C" { pub fn ibv_ack_async_event (event : * mut ibv_async_event) ; } extern "C" { pub fn ibv_query... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299044 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_device (context : * mut ibv_context , device_attr : * mut ibv_device_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299185 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_port (context : * mut ibv_context , port_num : u8 , port_attr : * mut _compat_ibv_port_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299344 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_gid (context : * mut ibv_context , port_num : u8 , index : :: std :: os :: raw :: c_int , gid : * mut ibv_gid) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299521 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_pkey (context : * mut ibv_context , port_num : u8 , index : :: std :: os :: raw :: c_int , pkey : * mut __be16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299699 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_pkey_index (context : * mut ibv_context , port_num : u8 , pkey : __be16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299836 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: os :: raw :: c_int ; } extern "C" { pub fn ibv_alloc_pd (context : * mut ibv_context) -> * mut ibv_pd ; } extern "C" { pub fn ibv_d... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299919 [INFO] [stdout] | [INFO] [stdout] 3 | ...) -> * mut ibv_pd ; } extern "C" { pub fn ibv_dealloc_pd (pd : * mut ibv_pd) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300010 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr_iova2 (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , iova : u64 , access : :: std :: os :: raw :: c_uint) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300203 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300376 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr_iova (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , iova : u64 , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300567 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_dmabuf_mr (pd : * mut ibv_pd , offset : u64 , length : usize , iova : u64 , fd : :: std :: os :: raw :: c_int , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301113 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_rereg_mr (mr : * mut ibv_mr , flags : :: std :: os :: raw :: c_int , pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , access : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301363 [INFO] [stdout] | [INFO] [stdout] 3 | ...os :: raw :: c_int ; } extern "C" { pub fn ibv_dereg_mr (mr : * mut ibv_mr) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ib... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301452 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn ibv_create_comp_channel (context : * mut ibv_context) -> * mut ibv_comp_channel ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301556 [INFO] [stdout] | [INFO] [stdout] 3 | ...nnel ; } extern "C" { pub fn ibv_destroy_comp_channel (channel : * mut ibv_comp_channel) -> :: std :: os :: raw :: c_int ; } extern "C... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301672 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_create_cq (context : * mut ibv_context , cqe : :: std :: os :: raw :: c_int , cq_context : * mut :: std :: os :: raw :: c_void , channel : * mut ibv_comp_channel , comp_vector : :: std :: os :: raw :: c_int) -> * mut ibv_cq ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301924 [INFO] [stdout] | [INFO] [stdout] 3 | ...; } extern "C" { pub fn ibv_resize_cq (cq : * mut ibv_cq , cqe : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ext... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302051 [INFO] [stdout] | [INFO] [stdout] 3 | ...s :: raw :: c_int ; } extern "C" { pub fn ibv_destroy_cq (cq : * mut ibv_cq) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302142 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_cq_event (channel : * mut ibv_comp_channel , cq : * mut * mut ibv_cq , cq_context : * mut * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302333 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn ibv_ack_cq_events (cq : * mut ibv_cq , nevents : :: std :: os :: raw :: c_uint) ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302437 [INFO] [stdout] | [INFO] [stdout] 3 | ...nt) ; } extern "C" { pub fn ibv_create_srq (pd : * mut ibv_pd , srq_init_attr : * mut ibv_srq_init_attr) -> * mut ibv_srq ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302555 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_modify_srq (srq : * mut ibv_srq , srq_attr : * mut ibv_srq_attr , srq_attr_mask : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302727 [INFO] [stdout] | [INFO] [stdout] 3 | ... ; } extern "C" { pub fn ibv_query_srq (srq : * mut ibv_srq , srq_attr : * mut ibv_srq_attr) -> :: std :: os :: raw :: c_int ; } exter... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302851 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: raw :: c_int ; } extern "C" { pub fn ibv_destroy_srq (srq : * mut ibv_srq) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302945 [INFO] [stdout] | [INFO] [stdout] 3 | ...c_int ; } extern "C" { pub fn ibv_create_qp (pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> * mut ibv_qp ; } extern "C"... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303059 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_modify_qp (qp : * mut ibv_qp , attr : * mut ibv_qp_attr , attr_mask : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303219 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_qp_data_in_order (qp : * mut ibv_qp , op : ibv_wr_opcode :: Type , flags : u32) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303365 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_qp (qp : * mut ibv_qp , attr : * mut ibv_qp_attr , attr_mask : :: std :: os :: raw :: c_int , init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303561 [INFO] [stdout] | [INFO] [stdout] 3 | ...s :: raw :: c_int ; } extern "C" { pub fn ibv_destroy_qp (qp : * mut ibv_qp) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303652 [INFO] [stdout] | [INFO] [stdout] 3 | ...raw :: c_int ; } extern "C" { pub fn ibv_create_ah (pd : * mut ibv_pd , attr : * mut ibv_ah_attr) -> * mut ibv_ah ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303753 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_init_ah_from_wc (context : * mut ibv_context , port_num : u8 , wc : * mut ibv_wc , grh : * mut ibv_grh , ah_attr : * mut ibv_ah_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303947 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_create_ah_from_wc (pd : * mut ibv_pd , wc : * mut ibv_wc , grh : * mut ibv_grh , port_num : u8) -> * mut ibv_ah ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304087 [INFO] [stdout] | [INFO] [stdout] 3 | ...) -> * mut ibv_ah ; } extern "C" { pub fn ibv_destroy_ah (ah : * mut ibv_ah) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304178 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_attach_mcast (qp : * mut ibv_qp , gid : * const ibv_gid , lid : u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304307 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_detach_mcast (qp : * mut ibv_qp , gid : * const ibv_gid , lid : u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304436 [INFO] [stdout] | [INFO] [stdout] 3 | ... std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_fork_init () -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_is_for... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304509 [INFO] [stdout] | [INFO] [stdout] 3 | ...: std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_is_fork_initialized () -> ibv_fork_status ; } extern "C" { pub fn ibv_node_typ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304579 [INFO] [stdout] | [INFO] [stdout] 3 | ...tus ; } extern "C" { pub fn ibv_node_type_str (node_type : ibv_node_type :: Type) -> * const :: std :: os :: raw :: c_char ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304698 [INFO] [stdout] | [INFO] [stdout] 3 | ...r ; } extern "C" { pub fn ibv_port_state_str (port_state : ibv_port_state :: Type) -> * const :: std :: os :: raw :: c_char ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304820 [INFO] [stdout] | [INFO] [stdout] 3 | ...: c_char ; } extern "C" { pub fn ibv_event_type_str (event : ibv_event_type) -> * const :: std :: os :: raw :: c_char ; } extern "C" {... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304929 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_resolve_eth_l2_from_gid (context : * mut ibv_context , attr : * mut ibv_ah_attr , eth_mac : * mut u8 , vid : * mut u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:305109 [INFO] [stdout] | [INFO] [stdout] 3 | ...: c_int ; } extern "C" { pub fn ibv_set_ece (qp : * mut ibv_qp , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern "C" {... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:305219 [INFO] [stdout] | [INFO] [stdout] 3 | ... c_int ; } extern "C" { pub fn ibv_query_ece (qp : * mut ibv_qp , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } pub type so... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348432 [INFO] [stdout] | [INFO] [stdout] 3 | ..., stringify ! (addr))) ; } extern "C" { pub fn rdma_create_event_channel () -> * mut rdma_event_channel ; } extern "C" { pub fn rdma_d... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348513 [INFO] [stdout] | [INFO] [stdout] 3 | ...rdma_event_channel ; } extern "C" { pub fn rdma_destroy_event_channel (channel : * mut rdma_event_channel) ; } extern "C" { pub fn rdm... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348601 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_id (channel : * mut rdma_event_channel , id : * mut * mut rdma_cm_id , context : * mut :: std :: os :: raw :: c_void , ps : rdma_port_space :: Type) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348818 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_ep (id : * mut * mut rdma_cm_id , res : * mut rdma_addrinfo , pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349007 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_ep (id : * mut rdma_cm_id) ; } extern "C" { pub fn rdma_destroy_id... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349071 [INFO] [stdout] | [INFO] [stdout] 3 | ...ut rdma_cm_id) ; } extern "C" { pub fn rdma_destroy_id (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349167 [INFO] [stdout] | [INFO] [stdout] 3 | ...int ; } extern "C" { pub fn rdma_bind_addr (id : * mut rdma_cm_id , addr : * mut sockaddr) -> :: std :: os :: raw :: c_int ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349286 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_resolve_addr (id : * mut rdma_cm_id , src_addr : * mut sockaddr , dst_addr : * mut sockaddr , timeout_ms : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349484 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_resolve_route (id : * mut rdma_cm_id , timeout_ms : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349627 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_qp (id : * mut rdma_cm_id , pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349782 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_qp_ex (id : * mut rdma_cm_id , qp_init_attr : * mut ibv_qp_init_attr_ex) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349923 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_qp (id : * mut rdma_cm_id) ; } extern "C" { pub fn rdma_connect (i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349987 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_connect (id : * mut rdma_cm_id , conn_param : * mut rdma_conn_param) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350117 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: raw :: c_int ; } extern "C" { pub fn rdma_establish (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350212 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_listen (id : * mut rdma_cm_id , backlog : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350345 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_get_request (listen : * mut rdma_cm_id , id : * mut * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350476 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_accept (id : * mut rdma_cm_id , conn_param : * mut rdma_conn_param) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350605 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_reject (id : * mut rdma_cm_id , private_data : * const :: std :: os :: raw :: c_void , private_data_len : u8) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350776 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_reject_ece (id : * mut rdma_cm_id , private_data : * const :: std :: os :: raw :: c_void , private_data_len : u8) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350951 [INFO] [stdout] | [INFO] [stdout] 3 | ..._int ; } extern "C" { pub fn rdma_notify (id : * mut rdma_cm_id , event : ibv_event_type) -> :: std :: os :: raw :: c_int ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351068 [INFO] [stdout] | [INFO] [stdout] 3 | ...: raw :: c_int ; } extern "C" { pub fn rdma_disconnect (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351164 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_join_multicast (id : * mut rdma_cm_id , addr : * mut sockaddr , context : * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351336 [INFO] [stdout] | [INFO] [stdout] 3 | ... ; } extern "C" { pub fn rdma_leave_multicast (id : * mut rdma_cm_id , addr : * mut sockaddr) -> :: std :: os :: raw :: c_int ; } exte... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351461 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_join_multicast_ex (id : * mut rdma_cm_id , mc_join_attr : * mut rdma_cm_join_mc_attr_ex , context : * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351659 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_get_cm_event (channel : * mut rdma_event_channel , event : * mut * mut rdma_cm_event) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351806 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn rdma_ack_cm_event (event : * mut rdma_cm_event) -> :: std :: os :: raw :: c_int ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351910 [INFO] [stdout] | [INFO] [stdout] 3 | ...td :: os :: raw :: c_int ; } extern "C" { pub fn rdma_get_src_port (id : * mut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351986 [INFO] [stdout] | [INFO] [stdout] 3 | ...ut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_dst_port (id : * mut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352062 [INFO] [stdout] | [INFO] [stdout] 3 | ...e16 ; } extern "C" { pub fn rdma_get_devices (num_devices : * mut :: std :: os :: raw :: c_int) -> * mut * mut ibv_context ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352181 [INFO] [stdout] | [INFO] [stdout] 3 | ...> * mut * mut ibv_context ; } extern "C" { pub fn rdma_free_devices (list : * mut * mut ibv_context) ; } extern "C" { pub fn rdma_even... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352256 [INFO] [stdout] | [INFO] [stdout] 3 | ...ext) ; } extern "C" { pub fn rdma_event_str (event : rdma_cm_event_type :: Type) -> * const :: std :: os :: raw :: c_char ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352373 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_set_option (id : * mut rdma_cm_id , level : :: std :: os :: raw :: c_int , optname : :: std :: os :: raw :: c_int , optval : * mut :: std :: os :: raw :: c_void , optlen : usize) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352613 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_migrate_id (id : * mut rdma_cm_id , channel : * mut rdma_event_channel) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352746 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_getaddrinfo (node : * const :: std :: os :: raw :: c_char , service : * const :: std :: os :: raw :: c_char , hints : * const rdma_addrinfo , res : * mut * mut rdma_addrinfo) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352982 [INFO] [stdout] | [INFO] [stdout] 3 | ...: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_freeaddrinfo (res : * mut rdma_addrinfo) ; } extern "C" { pub fn rdma_init_qp... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353052 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_init_qp_attr (id : * mut rdma_cm_id , qp_attr : * mut ibv_qp_attr , qp_attr_mask : * mut :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353232 [INFO] [stdout] | [INFO] [stdout] 3 | ...nt ; } extern "C" { pub fn rdma_set_local_ece (id : * mut rdma_cm_id , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353353 [INFO] [stdout] | [INFO] [stdout] 3 | ...t ; } extern "C" { pub fn rdma_get_remote_ece (id : * mut rdma_cm_id , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353475 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_srq (id : * mut rdma_cm_id , pd : * mut ibv_pd , attr : * mut ibv_srq_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353624 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_srq_ex (id : * mut rdma_cm_id , attr : * mut ibv_srq_init_attr_ex) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353759 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_srq (id : * mut rdma_cm_id) ; } # [repr (C)] # [derive (Copy , Clo... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:22 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr_2021, $op : expr ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:34 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr_2021 ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:254:11 [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr, $container:path, $field:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:272:11 [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr, $field:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:279 [INFO] [stdout] | [INFO] [stdout] 3 | ...ub unsafe fn as_ref (& self) -> & T { :: std :: mem :: transmute (self) } # [inline] pub unsafe fn as_mut (& mut self) -> & mut T { ::... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:240 [INFO] [stdout] | [INFO] [stdout] 3 | ...d (:: std :: marker :: PhantomData) } # [inline] pub unsafe fn as_ref (& self) -> & T { :: std :: mem :: transmute (self) } # [inline]... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:373 [INFO] [stdout] | [INFO] [stdout] 3 | ...e fn as_mut (& mut self) -> & mut T { :: std :: mem :: transmute (self) } } impl < T > :: std :: default :: Default for __BindgenUnion... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:326 [INFO] [stdout] | [INFO] [stdout] 3 | ... std :: mem :: transmute (self) } # [inline] pub unsafe fn as_mut (& mut self) -> & mut T { :: std :: mem :: transmute (self) } } impl... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / pub unsafe fn ibv_wr_atomic_cmp_swp( [INFO] [stdout] 13 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 14 | | rkey: u32, [INFO] [stdout] 15 | | remote_addr: u64, [INFO] [stdout] 16 | | compare: u64, [INFO] [stdout] 17 | | swap: u64, [INFO] [stdout] 18 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn ibv_wr_atomic_fetch_add(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64, add: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:28:1 [INFO] [stdout] | [INFO] [stdout] 28 | / pub unsafe fn ibv_wr_bind_mw( [INFO] [stdout] 29 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 30 | | mw: *mut ibv_mw, [INFO] [stdout] 31 | | rkey: u32, [INFO] [stdout] 32 | | bind_info: *const ibv_mw_bind_info, [INFO] [stdout] 33 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:38:1 [INFO] [stdout] | [INFO] [stdout] 38 | pub unsafe fn ibv_wr_local_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn ibv_wr_rdma_read(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | pub unsafe fn ibv_wr_rdma_write(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:53:1 [INFO] [stdout] | [INFO] [stdout] 53 | / pub unsafe fn ibv_wr_rdma_write_imm( [INFO] [stdout] 54 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 55 | | rkey: u32, [INFO] [stdout] 56 | | remote_addr: u64, [INFO] [stdout] 57 | | imm_data: __be32, [INFO] [stdout] 58 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:63:1 [INFO] [stdout] | [INFO] [stdout] 63 | pub unsafe fn ibv_wr_send(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | pub unsafe fn ibv_wr_send_imm(qp: *mut ibv_qp_ex, imm_data: __be32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:73:1 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn ibv_wr_send_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn ibv_wr_send_tso(qp: *mut ibv_qp_ex, hdr: *mut c_void, hdr_sz: u16, mss: u16) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:83:1 [INFO] [stdout] | [INFO] [stdout] 83 | / pub unsafe fn ibv_wr_set_ud_addr( [INFO] [stdout] 84 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 85 | | ah: *mut ibv_ah, [INFO] [stdout] 86 | | remote_qpn: u32, [INFO] [stdout] 87 | | remote_qkey: u32, [INFO] [stdout] 88 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:93:1 [INFO] [stdout] | [INFO] [stdout] 93 | pub unsafe fn ibv_wr_set_xrc_srqn(qp: *mut ibv_qp_ex, remote_srqn: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:98:1 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn ibv_wr_set_inline_data(qp: *mut ibv_qp_ex, addr: *mut c_void, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:103:1 [INFO] [stdout] | [INFO] [stdout] 103 | / pub unsafe fn ibv_wr_set_inline_data_list( [INFO] [stdout] 104 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 105 | | num_buf: usize, [INFO] [stdout] 106 | | buf_list: *const ibv_data_buf, [INFO] [stdout] 107 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:112:1 [INFO] [stdout] | [INFO] [stdout] 112 | pub unsafe fn ibv_wr_set_sge(qp: *mut ibv_qp_ex, lkey: u32, addr: u64, length: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | pub unsafe fn ibv_wr_set_sge_list(qp: *mut ibv_qp_ex, num_sge: usize, sg_list: *const ibv_sge) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | pub unsafe fn ibv_wr_start(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | pub unsafe fn ibv_wr_complete(qp: *mut ibv_qp_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:132:1 [INFO] [stdout] | [INFO] [stdout] 132 | pub unsafe fn ibv_wr_abort(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:143:1 [INFO] [stdout] | [INFO] [stdout] 143 | pub unsafe fn ibv_start_poll(cq: *mut ibv_cq_ex, attr: *mut ibv_poll_cq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | pub unsafe fn ibv_next_poll(cq: *mut ibv_cq_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:153:1 [INFO] [stdout] | [INFO] [stdout] 153 | pub unsafe fn ibv_end_poll(cq: *mut ibv_cq_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:158:1 [INFO] [stdout] | [INFO] [stdout] 158 | pub unsafe fn ibv_wc_read_opcode(cq: *mut ibv_cq_ex) -> ibv_wc_opcode::Type { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:163:1 [INFO] [stdout] | [INFO] [stdout] 163 | pub unsafe fn ibv_wc_read_vendor_err(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:168:1 [INFO] [stdout] | [INFO] [stdout] 168 | pub unsafe fn ibv_wc_read_byte_len(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:173:1 [INFO] [stdout] | [INFO] [stdout] 173 | pub unsafe fn ibv_wc_read_imm_data(cq: *mut ibv_cq_ex) -> __be32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:178:1 [INFO] [stdout] | [INFO] [stdout] 178 | pub unsafe fn ibv_wc_read_invalidated_rkey(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | pub unsafe fn ibv_wc_read_qp_num(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:193:1 [INFO] [stdout] | [INFO] [stdout] 193 | pub unsafe fn ibv_wc_read_src_qp(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | pub unsafe fn ibv_wc_read_wc_flags(cq: *mut ibv_cq_ex) -> c_uint { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | pub unsafe fn ibv_wc_read_slid(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:208:1 [INFO] [stdout] | [INFO] [stdout] 208 | pub unsafe fn ibv_wc_read_sl(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:213:1 [INFO] [stdout] | [INFO] [stdout] 213 | pub unsafe fn ibv_wc_read_dlid_path_bits(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:218:1 [INFO] [stdout] | [INFO] [stdout] 218 | pub unsafe fn ibv_wc_read_completion_ts(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | pub unsafe fn ibv_wc_read_completion_wallclock_ns(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | pub unsafe fn ibv_wc_read_cvlan(cq: *mut ibv_cq_ex) -> u16 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | pub unsafe fn ibv_wc_read_flow_tag(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:238:1 [INFO] [stdout] | [INFO] [stdout] 238 | pub unsafe fn ibv_wc_read_tm_info(cq: *mut ibv_cq_ex, tm_info: *mut ibv_wc_tm_info) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | / pub unsafe fn ibv_post_wq_recv( [INFO] [stdout] 245 | | wq: *mut ibv_wq, [INFO] [stdout] 246 | | recv_wr: *mut ibv_recv_wr, [INFO] [stdout] 247 | | bad_recv_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 248 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:263:8 [INFO] [stdout] | [INFO] [stdout] 263 | if (*ctx).abi_compat as usize != u32::MAX as usize { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:262:1 [INFO] [stdout] | [INFO] [stdout] 262 | unsafe fn verbs_get_ctx(ctx: *const ibv_context) -> Option<*mut verbs_context> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:255:9 [INFO] [stdout] | [INFO] [stdout] 255 | ($ptr as *const _ as *const u8).sub(memoffset::offset_of!($container, $field)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 266 | let vcp = container_of!(ctx, verbs_context, context) as *mut _; [INFO] [stdout] | ------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `container_of` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_device_list` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:320:5 [INFO] [stdout] | [INFO] [stdout] 320 | ibv_get_device_list(num_devices) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:317:1 [INFO] [stdout] | [INFO] [stdout] 317 | pub unsafe fn __ibv_get_device_list(num_devices: *mut c_int) -> *mut *mut ibv_device { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:328:1 [INFO] [stdout] | [INFO] [stdout] 328 | / pub unsafe fn ___ibv_query_port( [INFO] [stdout] 329 | | context: *mut ibv_context, [INFO] [stdout] 330 | | port_num: u8, [INFO] [stdout] 331 | | port_attr: *mut ibv_port_attr, [INFO] [stdout] 332 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:9 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:9 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:85 [INFO] [stdout] | [INFO] [stdout] 336 | (*vctx).query_port.unwrap()(context, port_num, port_attr, mem::size_of_val(&*port_attr)) [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_query_port` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:340:9 [INFO] [stdout] | [INFO] [stdout] 340 | ibv_query_port(context, port_num, compat_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:346:1 [INFO] [stdout] | [INFO] [stdout] 346 | pub unsafe fn ibv_create_flow(qp: *mut ibv_qp, flow: *mut ibv_flow_attr) -> Option<*mut ibv_flow> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:347:33 [INFO] [stdout] | [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 347 | let vcr = verbs_get_ctx_op!((*qp).context, ibv_create_flow); [INFO] [stdout] | ------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:350:14 [INFO] [stdout] | [INFO] [stdout] 350 | Some((*vctx).ibv_create_flow.unwrap()(qp, flow)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:350:14 [INFO] [stdout] | [INFO] [stdout] 350 | Some((*vctx).ibv_create_flow.unwrap()(qp, flow)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:352:9 [INFO] [stdout] | [INFO] [stdout] 352 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:352:10 [INFO] [stdout] | [INFO] [stdout] 352 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:358:1 [INFO] [stdout] | [INFO] [stdout] 358 | pub unsafe fn ibv_destroy_flow(flow_id: *mut ibv_flow) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:359:33 [INFO] [stdout] | [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 359 | let vcr = verbs_get_ctx_op!((*flow_id).context, ibv_destroy_flow); [INFO] [stdout] | ------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:362:9 [INFO] [stdout] | [INFO] [stdout] 362 | (*vctx).ibv_destroy_flow.unwrap()(flow_id) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:362:9 [INFO] [stdout] | [INFO] [stdout] 362 | (*vctx).ibv_destroy_flow.unwrap()(flow_id) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe fn ibv_create_flow_action_esp( [INFO] [stdout] 370 | | ctx: *mut ibv_context, [INFO] [stdout] 371 | | esp: *mut ibv_flow_action_esp_attr, [INFO] [stdout] 372 | | ) -> Option<*mut ibv_flow_action> { [INFO] [stdout] | |_________________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 373 | let vcr = verbs_get_ctx_op!(ctx, create_flow_action_esp); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:376:14 [INFO] [stdout] | [INFO] [stdout] 376 | Some((*vctx).create_flow_action_esp.unwrap()(ctx, esp)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:376:14 [INFO] [stdout] | [INFO] [stdout] 376 | Some((*vctx).create_flow_action_esp.unwrap()(ctx, esp)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:378:10 [INFO] [stdout] | [INFO] [stdout] 378 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:384:1 [INFO] [stdout] | [INFO] [stdout] 384 | / pub unsafe fn ibv_modify_flow_action_esp( [INFO] [stdout] 385 | | action: *mut ibv_flow_action, [INFO] [stdout] 386 | | esp: *mut ibv_flow_action_esp_attr, [INFO] [stdout] 387 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:388:33 [INFO] [stdout] | [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 388 | let vcr = verbs_get_ctx_op!((*action).context, modify_flow_action_esp); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:391:9 [INFO] [stdout] | [INFO] [stdout] 391 | (*vctx).modify_flow_action_esp.unwrap()(action, esp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:391:9 [INFO] [stdout] | [INFO] [stdout] 391 | (*vctx).modify_flow_action_esp.unwrap()(action, esp) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:398:1 [INFO] [stdout] | [INFO] [stdout] 398 | pub unsafe fn ibv_destroy_flow_action(action: *mut ibv_flow_action) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:399:33 [INFO] [stdout] | [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 399 | let vcr = verbs_get_ctx_op!((*action).context, destroy_flow_action); [INFO] [stdout] | --------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:402:9 [INFO] [stdout] | [INFO] [stdout] 402 | (*vctx).destroy_flow_action.unwrap()(action) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:402:9 [INFO] [stdout] | [INFO] [stdout] 402 | (*vctx).destroy_flow_action.unwrap()(action) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:410:1 [INFO] [stdout] | [INFO] [stdout] 410 | / pub unsafe fn ibv_open_xrcd( [INFO] [stdout] 411 | | context: *mut ibv_context, [INFO] [stdout] 412 | | xrcd_init_attr: *mut ibv_xrcd_init_attr, [INFO] [stdout] 413 | | ) -> Option<*mut ibv_xrcd> { [INFO] [stdout] | |__________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 414 | let vcr = verbs_get_ctx_op!(context, open_xrcd); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:417:14 [INFO] [stdout] | [INFO] [stdout] 417 | Some((*vctx).open_xrcd.unwrap()(context, xrcd_init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:417:14 [INFO] [stdout] | [INFO] [stdout] 417 | Some((*vctx).open_xrcd.unwrap()(context, xrcd_init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:419:9 [INFO] [stdout] | [INFO] [stdout] 419 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:419:10 [INFO] [stdout] | [INFO] [stdout] 419 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:426:16 [INFO] [stdout] | [INFO] [stdout] 426 | let vctx = verbs_get_ctx((*xrcd).context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:425:1 [INFO] [stdout] | [INFO] [stdout] 425 | pub unsafe fn ibv_close_xrcd(xrcd: *mut ibv_xrcd) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:426:30 [INFO] [stdout] | [INFO] [stdout] 426 | let vctx = verbs_get_ctx((*xrcd).context); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:428:5 [INFO] [stdout] | [INFO] [stdout] 428 | (*vctx.unwrap()).close_xrcd.unwrap()(xrcd) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:428:5 [INFO] [stdout] | [INFO] [stdout] 428 | (*vctx.unwrap()).close_xrcd.unwrap()(xrcd) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:445:9 [INFO] [stdout] | [INFO] [stdout] 445 | ibv_reg_mr(pd, addr, length, access as c_int) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:433:1 [INFO] [stdout] | [INFO] [stdout] 433 | / pub unsafe fn __ibv_reg_mr( [INFO] [stdout] 434 | | pd: *mut ibv_pd, [INFO] [stdout] 435 | | addr: *mut c_void, [INFO] [stdout] 436 | | length: usize, [INFO] [stdout] 437 | | access: c_uint, [INFO] [stdout] 438 | | is_access_const: c_int, [INFO] [stdout] 439 | | ) -> *mut ibv_mr { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova2` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:447:9 [INFO] [stdout] | [INFO] [stdout] 447 | ibv_reg_mr_iova2(pd, addr, length, addr as u64, access) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:471:9 [INFO] [stdout] | [INFO] [stdout] 471 | ibv_reg_mr_iova(pd, addr, length, iova, access as c_int) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:458:1 [INFO] [stdout] | [INFO] [stdout] 458 | / pub unsafe fn __ibv_reg_mr_iova( [INFO] [stdout] 459 | | pd: *mut ibv_pd, [INFO] [stdout] 460 | | addr: *mut c_void, [INFO] [stdout] 461 | | length: usize, [INFO] [stdout] ... | [INFO] [stdout] 464 | | is_access_const: c_int, [INFO] [stdout] 465 | | ) -> *mut ibv_mr { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr_iova2` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:473:9 [INFO] [stdout] | [INFO] [stdout] 473 | ibv_reg_mr_iova2(pd, addr, length, iova, access) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:485:8 [INFO] [stdout] | [INFO] [stdout] 485 | if (*(*pd).context).ops.alloc_mw.is_some() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:484:1 [INFO] [stdout] | [INFO] [stdout] 484 | pub unsafe fn ibv_alloc_mw(pd: *mut ibv_pd, type_: ibv_mw_type::Type) -> Option<*mut ibv_mw> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:485:10 [INFO] [stdout] | [INFO] [stdout] 485 | if (*(*pd).context).ops.alloc_mw.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:14 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:14 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:486:16 [INFO] [stdout] | [INFO] [stdout] 486 | Some((*(*pd).context).ops.alloc_mw.unwrap()(pd, type_)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:488:9 [INFO] [stdout] | [INFO] [stdout] 488 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:488:10 [INFO] [stdout] | [INFO] [stdout] 488 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:5 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:494:1 [INFO] [stdout] | [INFO] [stdout] 494 | pub unsafe fn ibv_dealloc_mw(mw: *mut ibv_mw) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:5 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:495:7 [INFO] [stdout] | [INFO] [stdout] 495 | (*(*mw).context).ops.dealloc_mw.unwrap()(mw) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:509:8 [INFO] [stdout] | [INFO] [stdout] 509 | if (*mw).type_ != ibv_mw_type::IBV_MW_TYPE_1 { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:508:1 [INFO] [stdout] | [INFO] [stdout] 508 | pub unsafe fn ibv_bind_mw(qp: *mut ibv_qp, mw: *mut ibv_mw, mw_bind: *mut ibv_mw_bind) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:512:11 [INFO] [stdout] | [INFO] [stdout] 512 | (*(*mw).context).ops.bind_mw.unwrap()(qp, mw, mw_bind) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:517:1 [INFO] [stdout] | [INFO] [stdout] 517 | / pub unsafe fn ibv_advise_mr( [INFO] [stdout] 518 | | pd: *mut ibv_pd, [INFO] [stdout] 519 | | advice: ibv_advise_mr_advice, [INFO] [stdout] 520 | | flags: u32, [INFO] [stdout] 521 | | sg_list: *mut ibv_sge, [INFO] [stdout] 522 | | num_sge: u32, [INFO] [stdout] 523 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:524:33 [INFO] [stdout] | [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 524 | let vcr = verbs_get_ctx_op!((*pd).context, advise_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:527:9 [INFO] [stdout] | [INFO] [stdout] 527 | (*vctx).advise_mr.unwrap()(pd, advice, flags, sg_list, num_sge) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:527:9 [INFO] [stdout] | [INFO] [stdout] 527 | (*vctx).advise_mr.unwrap()(pd, advice, flags, sg_list, num_sge) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:535:1 [INFO] [stdout] | [INFO] [stdout] 535 | / pub unsafe fn ibv_alloc_dm( [INFO] [stdout] 536 | | context: *mut ibv_context, [INFO] [stdout] 537 | | attr: *mut ibv_alloc_dm_attr, [INFO] [stdout] 538 | | ) -> Option<*mut ibv_dm> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 539 | let vcr = verbs_get_ctx_op!(context, alloc_dm); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:542:14 [INFO] [stdout] | [INFO] [stdout] 542 | Some((*vctx).alloc_dm.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:542:14 [INFO] [stdout] | [INFO] [stdout] 542 | Some((*vctx).alloc_dm.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:544:9 [INFO] [stdout] | [INFO] [stdout] 544 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:544:10 [INFO] [stdout] | [INFO] [stdout] 544 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:550:1 [INFO] [stdout] | [INFO] [stdout] 550 | pub unsafe fn ibv_free_dm(dm: *mut ibv_dm) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:551:33 [INFO] [stdout] | [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 551 | let vcr = verbs_get_ctx_op!((*dm).context, free_dm); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:554:9 [INFO] [stdout] | [INFO] [stdout] 554 | (*vctx).free_dm.unwrap()(dm) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:554:9 [INFO] [stdout] | [INFO] [stdout] 554 | (*vctx).free_dm.unwrap()(dm) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | (*dm).memcpy_to_dm.unwrap()(dm, dm_offset, host_addr, length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:561:1 [INFO] [stdout] | [INFO] [stdout] 561 | / pub unsafe fn ibv_memcpy_to_dm( [INFO] [stdout] 562 | | dm: *mut ibv_dm, [INFO] [stdout] 563 | | dm_offset: u64, [INFO] [stdout] 564 | | host_addr: *const c_void, [INFO] [stdout] 565 | | length: usize, [INFO] [stdout] 566 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | (*dm).memcpy_to_dm.unwrap()(dm, dm_offset, host_addr, length) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:577:5 [INFO] [stdout] | [INFO] [stdout] 577 | (*dm).memcpy_from_dm.unwrap()(host_addr, dm, dm_offset, length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub unsafe fn ibv_memcpy_from_dm( [INFO] [stdout] 572 | | host_addr: *mut c_void, [INFO] [stdout] 573 | | dm: *mut ibv_dm, [INFO] [stdout] 574 | | dm_offset: u64, [INFO] [stdout] 575 | | length: usize, [INFO] [stdout] 576 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:577:5 [INFO] [stdout] | [INFO] [stdout] 577 | (*dm).memcpy_from_dm.unwrap()(host_addr, dm, dm_offset, length) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:581:1 [INFO] [stdout] | [INFO] [stdout] 581 | pub unsafe fn ibv_alloc_null_mr(pd: *mut ibv_pd) -> Option<*mut ibv_mr> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:582:33 [INFO] [stdout] | [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 582 | let vcr = verbs_get_ctx_op!((*pd).context, alloc_null_mr); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:585:14 [INFO] [stdout] | [INFO] [stdout] 585 | Some((*vctx).alloc_null_mr.unwrap()(pd)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:585:14 [INFO] [stdout] | [INFO] [stdout] 585 | Some((*vctx).alloc_null_mr.unwrap()(pd)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:587:9 [INFO] [stdout] | [INFO] [stdout] 587 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:587:10 [INFO] [stdout] | [INFO] [stdout] 587 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:593:1 [INFO] [stdout] | [INFO] [stdout] 593 | / pub unsafe fn ibv_reg_dm_mr( [INFO] [stdout] 594 | | pd: *mut ibv_pd, [INFO] [stdout] 595 | | dm: *mut ibv_dm, [INFO] [stdout] 596 | | dm_offset: u64, [INFO] [stdout] 597 | | length: usize, [INFO] [stdout] 598 | | access: u32, [INFO] [stdout] 599 | | ) -> Option<*mut ibv_mr> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:600:33 [INFO] [stdout] | [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 600 | let vcr = verbs_get_ctx_op!((*pd).context, reg_dm_mr); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:603:14 [INFO] [stdout] | [INFO] [stdout] 603 | Some((*vctx).reg_dm_mr.unwrap()( [INFO] [stdout] | ______________^ [INFO] [stdout] 604 | | pd, dm, dm_offset, length, access, [INFO] [stdout] 605 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:603:14 [INFO] [stdout] | [INFO] [stdout] 603 | Some((*vctx).reg_dm_mr.unwrap()( [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:607:9 [INFO] [stdout] | [INFO] [stdout] 607 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:607:10 [INFO] [stdout] | [INFO] [stdout] 607 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:614:1 [INFO] [stdout] | [INFO] [stdout] 614 | / pub unsafe fn ibv_create_cq_ex( [INFO] [stdout] 615 | | context: *mut ibv_context, [INFO] [stdout] 616 | | cq_attr: *mut ibv_cq_init_attr_ex, [INFO] [stdout] 617 | | ) -> Option<*mut ibv_cq_ex> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 618 | let vcr = verbs_get_ctx_op!(context, create_cq_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:621:14 [INFO] [stdout] | [INFO] [stdout] 621 | Some((*vctx).create_cq_ex.unwrap()(context, cq_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:621:14 [INFO] [stdout] | [INFO] [stdout] 621 | Some((*vctx).create_cq_ex.unwrap()(context, cq_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:623:9 [INFO] [stdout] | [INFO] [stdout] 623 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:623:10 [INFO] [stdout] | [INFO] [stdout] 623 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:5 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:630:1 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn ibv_poll_cq(cq: *mut ibv_cq, num_entries: i32, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:5 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:631:7 [INFO] [stdout] | [INFO] [stdout] 631 | (*(*cq).context).ops.poll_cq.unwrap()(cq, num_entries, wc) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:5 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:635:1 [INFO] [stdout] | [INFO] [stdout] 635 | pub unsafe fn ibv_req_notify_cq(cq: *mut ibv_cq, solicited_only: i32) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:5 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:636:7 [INFO] [stdout] | [INFO] [stdout] 636 | (*(*cq).context).ops.req_notify_cq.unwrap()(cq, solicited_only) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:640:1 [INFO] [stdout] | [INFO] [stdout] 640 | pub unsafe fn ibv_modify_cq(cq: *mut ibv_cq, attr: *mut ibv_modify_cq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:641:33 [INFO] [stdout] | [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 641 | let vcr = verbs_get_ctx_op!((*cq).context, modify_cq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:644:9 [INFO] [stdout] | [INFO] [stdout] 644 | (*vctx).modify_cq.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:644:9 [INFO] [stdout] | [INFO] [stdout] 644 | (*vctx).modify_cq.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:656:39 [INFO] [stdout] | [INFO] [stdout] 656 | let mask = ibv_srq_init_attr_mask((*srq_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:652:1 [INFO] [stdout] | [INFO] [stdout] 652 | / pub unsafe fn ibv_create_srq_ex( [INFO] [stdout] 653 | | context: *mut ibv_context, [INFO] [stdout] 654 | | srq_init_attr_ex: *mut ibv_srq_init_attr_ex, [INFO] [stdout] 655 | | ) -> Option<*mut ibv_srq> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:657:44 [INFO] [stdout] | [INFO] [stdout] 657 | let mask_inv = ibv_srq_init_attr_mask(!(*srq_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:667:17 [INFO] [stdout] | [INFO] [stdout] 667 | || ((*srq_init_attr_ex).srq_type == ibv_srq_type::IBV_SRQT_BASIC)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_create_srq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | Some(ibv_create_srq( [INFO] [stdout] | ______________^ [INFO] [stdout] 670 | | (*srq_init_attr_ex).pd, [INFO] [stdout] 671 | | srq_init_attr_ex as *mut ibv_srq_init_attr, [INFO] [stdout] 672 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:670:13 [INFO] [stdout] | [INFO] [stdout] 670 | (*srq_init_attr_ex).pd, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 674 | let vcr = verbs_get_ctx_op!(context, create_srq_ex); [INFO] [stdout] | ----------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:677:18 [INFO] [stdout] | [INFO] [stdout] 677 | Some((*vctx).create_srq_ex.unwrap()(context, srq_init_attr_ex)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:677:18 [INFO] [stdout] | [INFO] [stdout] 677 | Some((*vctx).create_srq_ex.unwrap()(context, srq_init_attr_ex)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:679:13 [INFO] [stdout] | [INFO] [stdout] 679 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:679:14 [INFO] [stdout] | [INFO] [stdout] 679 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:686:1 [INFO] [stdout] | [INFO] [stdout] 686 | pub unsafe fn ibv_get_srq_num(srq: *mut ibv_srq, srq_num: *mut u32) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:687:33 [INFO] [stdout] | [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 687 | let vcr = verbs_get_ctx_op!((*srq).context, get_srq_num); [INFO] [stdout] | ---------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:690:9 [INFO] [stdout] | [INFO] [stdout] 690 | (*vctx).get_srq_num.unwrap()(srq, srq_num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:690:9 [INFO] [stdout] | [INFO] [stdout] 690 | (*vctx).get_srq_num.unwrap()(srq, srq_num) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:697:1 [INFO] [stdout] | [INFO] [stdout] 697 | / pub unsafe fn ibv_post_srq_recv( [INFO] [stdout] 698 | | srq: *mut ibv_srq, [INFO] [stdout] 699 | | recv_wr: *mut ibv_recv_wr, [INFO] [stdout] 700 | | bad_recv_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 701 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:5 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:702:7 [INFO] [stdout] | [INFO] [stdout] 702 | (*(*srq).context).ops.post_srq_recv.unwrap()(srq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:706:1 [INFO] [stdout] | [INFO] [stdout] 706 | / pub unsafe fn ibv_post_srq_ops( [INFO] [stdout] 707 | | srq: *mut ibv_srq, [INFO] [stdout] 708 | | op: *mut ibv_ops_wr, [INFO] [stdout] 709 | | bad_op: *mut *mut ibv_ops_wr, [INFO] [stdout] 710 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:711:33 [INFO] [stdout] | [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 711 | let vcr = verbs_get_ctx_op!((*srq).context, post_srq_ops); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:714:9 [INFO] [stdout] | [INFO] [stdout] 714 | (*vctx).post_srq_ops.unwrap()(srq, op, bad_op) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:714:9 [INFO] [stdout] | [INFO] [stdout] 714 | (*vctx).post_srq_ops.unwrap()(srq, op, bad_op) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:716:9 [INFO] [stdout] | [INFO] [stdout] 716 | *bad_op = op; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:727:38 [INFO] [stdout] | [INFO] [stdout] 727 | let mask = ibv_qp_init_attr_mask((*qp_init_attr_ex).comp_mask); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:723:1 [INFO] [stdout] | [INFO] [stdout] 723 | / pub unsafe fn ibv_create_qp_ex( [INFO] [stdout] 724 | | context: *mut ibv_context, [INFO] [stdout] 725 | | qp_init_attr_ex: *mut ibv_qp_init_attr_ex, [INFO] [stdout] 726 | | ) -> Option<*mut ibv_qp> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_create_qp` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:730:14 [INFO] [stdout] | [INFO] [stdout] 730 | Some(ibv_create_qp( [INFO] [stdout] | ______________^ [INFO] [stdout] 731 | | (*qp_init_attr_ex).pd, [INFO] [stdout] 732 | | qp_init_attr_ex as *mut ibv_qp_init_attr, [INFO] [stdout] 733 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:731:13 [INFO] [stdout] | [INFO] [stdout] 731 | (*qp_init_attr_ex).pd, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 735 | let vcr = verbs_get_ctx_op!(context, create_qp_ex); [INFO] [stdout] | ---------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:738:18 [INFO] [stdout] | [INFO] [stdout] 738 | Some((*vctx).create_qp_ex.unwrap()(context, qp_init_attr_ex)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:738:18 [INFO] [stdout] | [INFO] [stdout] 738 | Some((*vctx).create_qp_ex.unwrap()(context, qp_init_attr_ex)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:740:13 [INFO] [stdout] | [INFO] [stdout] 740 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:740:14 [INFO] [stdout] | [INFO] [stdout] 740 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:748:1 [INFO] [stdout] | [INFO] [stdout] 748 | / pub unsafe fn ibv_alloc_td( [INFO] [stdout] 749 | | context: *mut ibv_context, [INFO] [stdout] 750 | | init_attr: *mut ibv_td_init_attr, [INFO] [stdout] 751 | | ) -> Option<*mut ibv_td> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 752 | let vcr = verbs_get_ctx_op!(context, alloc_td); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:755:14 [INFO] [stdout] | [INFO] [stdout] 755 | Some((*vctx).alloc_td.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:755:14 [INFO] [stdout] | [INFO] [stdout] 755 | Some((*vctx).alloc_td.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:757:9 [INFO] [stdout] | [INFO] [stdout] 757 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:757:10 [INFO] [stdout] | [INFO] [stdout] 757 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:763:1 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn ibv_dealloc_td(td: *mut ibv_td) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:764:33 [INFO] [stdout] | [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 764 | let vcr = verbs_get_ctx_op!((*td).context, dealloc_td); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:767:9 [INFO] [stdout] | [INFO] [stdout] 767 | (*vctx).dealloc_td.unwrap()(td) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:767:9 [INFO] [stdout] | [INFO] [stdout] 767 | (*vctx).dealloc_td.unwrap()(td) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:775:1 [INFO] [stdout] | [INFO] [stdout] 775 | / pub unsafe fn ibv_alloc_parent_domain( [INFO] [stdout] 776 | | context: *mut ibv_context, [INFO] [stdout] 777 | | attr: *mut ibv_parent_domain_init_attr, [INFO] [stdout] 778 | | ) -> Option<*mut ibv_pd> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 779 | let vcr = verbs_get_ctx_op!(context, alloc_parent_domain); [INFO] [stdout] | ----------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:782:14 [INFO] [stdout] | [INFO] [stdout] 782 | Some((*vctx).alloc_parent_domain.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:782:14 [INFO] [stdout] | [INFO] [stdout] 782 | Some((*vctx).alloc_parent_domain.unwrap()(context, attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:784:9 [INFO] [stdout] | [INFO] [stdout] 784 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:784:10 [INFO] [stdout] | [INFO] [stdout] 784 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:791:1 [INFO] [stdout] | [INFO] [stdout] 791 | / pub unsafe fn ibv_query_rt_values_ex( [INFO] [stdout] 792 | | context: *mut ibv_context, [INFO] [stdout] 793 | | values: *mut ibv_values_ex, [INFO] [stdout] 794 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 795 | let vcr = verbs_get_ctx_op!(context, query_rt_values); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:798:9 [INFO] [stdout] | [INFO] [stdout] 798 | (*vctx).query_rt_values.unwrap()(context, values) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:798:9 [INFO] [stdout] | [INFO] [stdout] 798 | (*vctx).query_rt_values.unwrap()(context, values) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:805:1 [INFO] [stdout] | [INFO] [stdout] 805 | / pub unsafe fn ibv_query_device_ex( [INFO] [stdout] 806 | | context: *mut ibv_context, [INFO] [stdout] 807 | | input: *const ibv_query_device_ex_input, [INFO] [stdout] 808 | | attr: *mut ibv_device_attr_ex, [INFO] [stdout] 809 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 810 | let vcr = verbs_get_ctx_op!(context, query_device_ex); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:19 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:19 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:813:92 [INFO] [stdout] | [INFO] [stdout] 813 | let ret = (*vctx).query_device_ex.unwrap()(context, input, attr, mem::size_of_val(&*attr)); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_query_device` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:820:5 [INFO] [stdout] | [INFO] [stdout] 820 | ibv_query_device(context, &mut (*attr).orig_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:820:36 [INFO] [stdout] | [INFO] [stdout] 820 | ibv_query_device(context, &mut (*attr).orig_attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:825:1 [INFO] [stdout] | [INFO] [stdout] 825 | / pub unsafe fn ibv_open_qp( [INFO] [stdout] 826 | | context: *mut ibv_context, [INFO] [stdout] 827 | | qp_open_attr: *mut ibv_qp_open_attr, [INFO] [stdout] 828 | | ) -> Option<*mut ibv_qp> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 829 | let vcr = verbs_get_ctx_op!(context, open_qp); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:832:14 [INFO] [stdout] | [INFO] [stdout] 832 | Some((*vctx).open_qp.unwrap()(context, qp_open_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:832:14 [INFO] [stdout] | [INFO] [stdout] 832 | Some((*vctx).open_qp.unwrap()(context, qp_open_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:834:9 [INFO] [stdout] | [INFO] [stdout] 834 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:834:10 [INFO] [stdout] | [INFO] [stdout] 834 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:840:1 [INFO] [stdout] | [INFO] [stdout] 840 | / pub unsafe fn ibv_modify_qp_rate_limit( [INFO] [stdout] 841 | | qp: *mut ibv_qp, [INFO] [stdout] 842 | | attr: *mut ibv_qp_rate_limit_attr, [INFO] [stdout] 843 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:844:33 [INFO] [stdout] | [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 844 | let vcr = verbs_get_ctx_op!((*qp).context, modify_qp_rate_limit); [INFO] [stdout] | ------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:847:9 [INFO] [stdout] | [INFO] [stdout] 847 | (*vctx).modify_qp_rate_limit.unwrap()(qp, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:847:9 [INFO] [stdout] | [INFO] [stdout] 847 | (*vctx).modify_qp_rate_limit.unwrap()(qp, attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:855:1 [INFO] [stdout] | [INFO] [stdout] 855 | / pub unsafe fn ibv_create_wq( [INFO] [stdout] 856 | | context: *mut ibv_context, [INFO] [stdout] 857 | | wq_init_attr: *mut ibv_wq_init_attr, [INFO] [stdout] 858 | | ) -> Option<*mut ibv_wq> { [INFO] [stdout] | |________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 859 | let vcr = verbs_get_ctx_op!(context, create_wq); [INFO] [stdout] | ------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:862:18 [INFO] [stdout] | [INFO] [stdout] 862 | let wq = (*vctx).create_wq.unwrap()(context, wq_init_attr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:862:18 [INFO] [stdout] | [INFO] [stdout] 862 | let wq = (*vctx).create_wq.unwrap()(context, wq_init_attr); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:864:13 [INFO] [stdout] | [INFO] [stdout] 864 | (*wq).events_completed = 0; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::pthread_mutex_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:865:13 [INFO] [stdout] | [INFO] [stdout] 865 | / libc::pthread_mutex_init( [INFO] [stdout] 866 | | &mut (*wq).mutex, [INFO] [stdout] 867 | | ptr::null::() as *mut _, [INFO] [stdout] 868 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:866:22 [INFO] [stdout] | [INFO] [stdout] 866 | &mut (*wq).mutex, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::pthread_cond_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:869:13 [INFO] [stdout] | [INFO] [stdout] 869 | / libc::pthread_cond_init( [INFO] [stdout] 870 | | &mut (*wq).cond, [INFO] [stdout] 871 | | ptr::null::() as *mut _, [INFO] [stdout] 872 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:870:22 [INFO] [stdout] | [INFO] [stdout] 870 | &mut (*wq).cond, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:876:9 [INFO] [stdout] | [INFO] [stdout] 876 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:876:10 [INFO] [stdout] | [INFO] [stdout] 876 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:882:1 [INFO] [stdout] | [INFO] [stdout] 882 | pub unsafe fn ibv_modify_wq(wq: *mut ibv_wq, wq_attr: *mut ibv_wq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:883:33 [INFO] [stdout] | [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 883 | let vcr = verbs_get_ctx_op!((*wq).context, modify_wq); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:886:9 [INFO] [stdout] | [INFO] [stdout] 886 | (*vctx).modify_wq.unwrap()(wq, wq_attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:886:9 [INFO] [stdout] | [INFO] [stdout] 886 | (*vctx).modify_wq.unwrap()(wq, wq_attr) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:893:1 [INFO] [stdout] | [INFO] [stdout] 893 | pub unsafe fn ibv_destroy_wq(wq: *mut ibv_wq) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:894:33 [INFO] [stdout] | [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 894 | let vcr = verbs_get_ctx_op!((*wq).context, destroy_wq); [INFO] [stdout] | -------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:897:9 [INFO] [stdout] | [INFO] [stdout] 897 | (*vctx).destroy_wq.unwrap()(wq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:897:9 [INFO] [stdout] | [INFO] [stdout] 897 | (*vctx).destroy_wq.unwrap()(wq) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:905:1 [INFO] [stdout] | [INFO] [stdout] 905 | / pub unsafe fn ibv_create_rwq_ind_table( [INFO] [stdout] 906 | | context: *mut ibv_context, [INFO] [stdout] 907 | | init_attr: *mut ibv_rwq_ind_table_init_attr, [INFO] [stdout] 908 | | ) -> Option<*mut ibv_rwq_ind_table> { [INFO] [stdout] | |___________________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 909 | let vcr = verbs_get_ctx_op!(context, create_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:912:14 [INFO] [stdout] | [INFO] [stdout] 912 | Some((*vctx).create_rwq_ind_table.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:912:14 [INFO] [stdout] | [INFO] [stdout] 912 | Some((*vctx).create_rwq_ind_table.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:914:9 [INFO] [stdout] | [INFO] [stdout] 914 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:914:10 [INFO] [stdout] | [INFO] [stdout] 914 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:920:1 [INFO] [stdout] | [INFO] [stdout] 920 | pub unsafe fn ibv_destroy_rwq_ind_table(rwq_ind_table: *mut ibv_rwq_ind_table) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:921:33 [INFO] [stdout] | [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 921 | let vcr = verbs_get_ctx_op!((*rwq_ind_table).context, destroy_rwq_ind_table); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:924:9 [INFO] [stdout] | [INFO] [stdout] 924 | (*vctx).destroy_rwq_ind_table.unwrap()(rwq_ind_table) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:924:9 [INFO] [stdout] | [INFO] [stdout] 924 | (*vctx).destroy_rwq_ind_table.unwrap()(rwq_ind_table) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:5 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:933:1 [INFO] [stdout] | [INFO] [stdout] 933 | / pub unsafe fn ibv_post_send( [INFO] [stdout] 934 | | qp: *mut ibv_qp, [INFO] [stdout] 935 | | wr: *mut ibv_send_wr, [INFO] [stdout] 936 | | bad_wr: *mut *mut ibv_send_wr, [INFO] [stdout] 937 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:5 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:938:7 [INFO] [stdout] | [INFO] [stdout] 938 | (*(*qp).context).ops.post_send.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:5 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:942:1 [INFO] [stdout] | [INFO] [stdout] 942 | / pub unsafe fn ibv_post_recv( [INFO] [stdout] 943 | | qp: *mut ibv_qp, [INFO] [stdout] 944 | | wr: *mut ibv_recv_wr, [INFO] [stdout] 945 | | bad_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 946 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:5 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:947:7 [INFO] [stdout] | [INFO] [stdout] 947 | (*(*qp).context).ops.post_recv.unwrap()(qp, wr, bad_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:957:1 [INFO] [stdout] | [INFO] [stdout] 957 | / pub unsafe fn ibv_create_counters( [INFO] [stdout] 958 | | context: *mut ibv_context, [INFO] [stdout] 959 | | init_attr: *mut ibv_counters_init_attr, [INFO] [stdout] 960 | | ) -> Option<*mut ibv_counters> { [INFO] [stdout] | |______________________________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 961 | let vcr = verbs_get_ctx_op!(context, create_counters); [INFO] [stdout] | ------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:964:14 [INFO] [stdout] | [INFO] [stdout] 964 | Some((*vctx).create_counters.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:964:14 [INFO] [stdout] | [INFO] [stdout] 964 | Some((*vctx).create_counters.unwrap()(context, init_attr)) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:966:9 [INFO] [stdout] | [INFO] [stdout] 966 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:966:10 [INFO] [stdout] | [INFO] [stdout] 966 | *libc::__errno_location() = libc::EOPNOTSUPP; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:972:1 [INFO] [stdout] | [INFO] [stdout] 972 | pub unsafe fn ibv_destroy_counters(counters: *mut ibv_counters) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:973:33 [INFO] [stdout] | [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 973 | let vcr = verbs_get_ctx_op!((*counters).context, destroy_counters); [INFO] [stdout] | -------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:976:9 [INFO] [stdout] | [INFO] [stdout] 976 | (*vctx).destroy_counters.unwrap()(counters) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:976:9 [INFO] [stdout] | [INFO] [stdout] 976 | (*vctx).destroy_counters.unwrap()(counters) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:983:1 [INFO] [stdout] | [INFO] [stdout] 983 | / pub unsafe fn ibv_attach_counters_point_flow( [INFO] [stdout] 984 | | counters: *mut ibv_counters, [INFO] [stdout] 985 | | attr: *mut ibv_counter_attach_attr, [INFO] [stdout] 986 | | flow: *mut ibv_flow, [INFO] [stdout] 987 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:988:33 [INFO] [stdout] | [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 988 | let vcr = verbs_get_ctx_op!((*counters).context, attach_counters_point_flow); [INFO] [stdout] | ------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:991:9 [INFO] [stdout] | [INFO] [stdout] 991 | (*vctx).attach_counters_point_flow.unwrap()(counters, attr, flow) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:991:9 [INFO] [stdout] | [INFO] [stdout] 991 | (*vctx).attach_counters_point_flow.unwrap()(counters, attr, flow) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:998:1 [INFO] [stdout] | [INFO] [stdout] 998 | / pub unsafe fn ibv_read_counters( [INFO] [stdout] 999 | | counters: *mut ibv_counters, [INFO] [stdout] 1000 | | counters_value: *mut u64, [INFO] [stdout] 1001 | | ncounters: u32, [INFO] [stdout] 1002 | | flags: u32, [INFO] [stdout] 1003 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1004:33 [INFO] [stdout] | [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1004 | let vcr = verbs_get_ctx_op!((*counters).context, read_counters); [INFO] [stdout] | ----------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1007:9 [INFO] [stdout] | [INFO] [stdout] 1007 | (*vctx).read_counters.unwrap()(counters, counters_value, ncounters, flags) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1007:9 [INFO] [stdout] | [INFO] [stdout] 1007 | (*vctx).read_counters.unwrap()(counters, counters_value, ncounters, flags) [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1030:6 [INFO] [stdout] | [INFO] [stdout] 1030 | &id.route.addr.src_addr_union.src_addr [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1029:1 [INFO] [stdout] | [INFO] [stdout] 1029 | pub unsafe fn rdma_get_local_addr(id: &rdma_cm_id) -> &libc::sockaddr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1035:6 [INFO] [stdout] | [INFO] [stdout] 1035 | &id.route.addr.dst_addr_union.dst_addr [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1034:1 [INFO] [stdout] | [INFO] [stdout] 1034 | pub unsafe fn rdma_get_peer_addr(id: &rdma_cm_id) -> &libc::sockaddr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1043:9 [INFO] [stdout] | [INFO] [stdout] 1043 | *libc::__errno_location() = ret; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1041:1 [INFO] [stdout] | [INFO] [stdout] 1041 | pub unsafe fn rdma_seterrno(ret: c_int) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libc::__errno_location` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1043:10 [INFO] [stdout] | [INFO] [stdout] 1043 | *libc::__errno_location() = ret; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1052:5 [INFO] [stdout] | [INFO] [stdout] 1052 | / ibv_reg_mr( [INFO] [stdout] 1053 | | (*id).pd, [INFO] [stdout] 1054 | | addr, [INFO] [stdout] 1055 | | length, [INFO] [stdout] 1056 | | ibv_access_flags::IBV_ACCESS_LOCAL_WRITE.0 as c_int, [INFO] [stdout] 1057 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1051:1 [INFO] [stdout] | [INFO] [stdout] 1051 | pub unsafe fn rdma_reg_msgs(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1053:9 [INFO] [stdout] | [INFO] [stdout] 1053 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1062:5 [INFO] [stdout] | [INFO] [stdout] 1062 | / ibv_reg_mr( [INFO] [stdout] 1063 | | (*id).pd, [INFO] [stdout] 1064 | | addr, [INFO] [stdout] 1065 | | length, [INFO] [stdout] 1066 | | (ibv_access_flags::IBV_ACCESS_LOCAL_WRITE | ibv_access_flags::IBV_ACCESS_REMOTE_READ).0 [INFO] [stdout] 1067 | | as c_int, [INFO] [stdout] 1068 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1061:1 [INFO] [stdout] | [INFO] [stdout] 1061 | pub unsafe fn rdma_reg_read(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1063:9 [INFO] [stdout] | [INFO] [stdout] 1063 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_reg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1073:5 [INFO] [stdout] | [INFO] [stdout] 1073 | / ibv_reg_mr( [INFO] [stdout] 1074 | | (*id).pd, [INFO] [stdout] 1075 | | addr, [INFO] [stdout] 1076 | | length, [INFO] [stdout] 1077 | | (ibv_access_flags::IBV_ACCESS_LOCAL_WRITE | ibv_access_flags::IBV_ACCESS_REMOTE_WRITE).0 [INFO] [stdout] 1078 | | as c_int, [INFO] [stdout] 1079 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1072:1 [INFO] [stdout] | [INFO] [stdout] 1072 | pub unsafe fn rdma_reg_write(id: *mut rdma_cm_id, addr: *mut c_void, length: usize) -> *mut ibv_mr { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1074:9 [INFO] [stdout] | [INFO] [stdout] 1074 | (*id).pd, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1084:5 [INFO] [stdout] | [INFO] [stdout] 1084 | rdma_seterrno(ibv_dereg_mr(mr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1083:1 [INFO] [stdout] | [INFO] [stdout] 1083 | pub unsafe fn rdma_dereg_mr(mr: *mut ibv_mr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_dereg_mr` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1084:19 [INFO] [stdout] | [INFO] [stdout] 1084 | rdma_seterrno(ibv_dereg_mr(mr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1102:8 [INFO] [stdout] | [INFO] [stdout] 1102 | if (*id).srq as usize != 0 { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1088:1 [INFO] [stdout] | [INFO] [stdout] 1088 | / pub unsafe fn rdma_post_recvv( [INFO] [stdout] 1089 | | id: *mut rdma_cm_id, [INFO] [stdout] 1090 | | context: *mut c_void, [INFO] [stdout] 1091 | | sgl: *mut ibv_sge, [INFO] [stdout] 1092 | | nsge: c_int, [INFO] [stdout] 1093 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:9 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_srq_recv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:23 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1103:41 [INFO] [stdout] | [INFO] [stdout] 1103 | rdma_seterrno(ibv_post_srq_recv((*id).srq, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:9 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_recv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:23 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1105:37 [INFO] [stdout] | [INFO] [stdout] 1105 | rdma_seterrno(ibv_post_recv((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1117:18 [INFO] [stdout] | [INFO] [stdout] 1117 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1110:1 [INFO] [stdout] | [INFO] [stdout] 1110 | / pub unsafe fn rdma_post_sendv( [INFO] [stdout] 1111 | | id: *mut rdma_cm_id, [INFO] [stdout] 1112 | | context: *mut c_void, [INFO] [stdout] 1113 | | sgl: *mut ibv_sge, [INFO] [stdout] 1114 | | nsge: c_int, [INFO] [stdout] 1115 | | flags: c_int, [INFO] [stdout] 1116 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:5 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:19 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1126:33 [INFO] [stdout] | [INFO] [stdout] 1126 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1139:18 [INFO] [stdout] | [INFO] [stdout] 1139 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1130:1 [INFO] [stdout] | [INFO] [stdout] 1130 | / pub unsafe fn rdma_post_readv( [INFO] [stdout] 1131 | | id: *mut rdma_cm_id, [INFO] [stdout] 1132 | | context: *mut c_void, [INFO] [stdout] 1133 | | sgl: *mut ibv_sge, [INFO] [stdout] ... | [INFO] [stdout] 1137 | | rkey: u32, [INFO] [stdout] 1138 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:5 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:19 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1151:33 [INFO] [stdout] | [INFO] [stdout] 1151 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1164:18 [INFO] [stdout] | [INFO] [stdout] 1164 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1155:1 [INFO] [stdout] | [INFO] [stdout] 1155 | / pub unsafe fn rdma_post_writev( [INFO] [stdout] 1156 | | id: *mut rdma_cm_id, [INFO] [stdout] 1157 | | context: *mut c_void, [INFO] [stdout] 1158 | | sgl: *mut ibv_sge, [INFO] [stdout] ... | [INFO] [stdout] 1162 | | rkey: u32, [INFO] [stdout] 1163 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:5 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:19 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1176:33 [INFO] [stdout] | [INFO] [stdout] 1176 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:17 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1180:1 [INFO] [stdout] | [INFO] [stdout] 1180 | / pub unsafe fn rdma_post_recv( [INFO] [stdout] 1181 | | id: *mut rdma_cm_id, [INFO] [stdout] 1182 | | context: *mut c_void, [INFO] [stdout] 1183 | | addr: *mut c_void, [INFO] [stdout] 1184 | | length: usize, [INFO] [stdout] 1185 | | mr: *mut ibv_mr, [INFO] [stdout] 1186 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:58 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1188:80 [INFO] [stdout] | [INFO] [stdout] 1188 | addr >= (*mr).addr && (addr as usize + length <= (*mr).addr as usize + (*mr).length), [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1196:15 [INFO] [stdout] | [INFO] [stdout] 1196 | lkey: (*mr).lkey, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_recvv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1199:5 [INFO] [stdout] | [INFO] [stdout] 1199 | rdma_post_recvv(id, context, &mut sge, nsge) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1214:34 [INFO] [stdout] | [INFO] [stdout] 1214 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1203:1 [INFO] [stdout] | [INFO] [stdout] 1203 | / pub unsafe fn rdma_post_send( [INFO] [stdout] 1204 | | id: *mut rdma_cm_id, [INFO] [stdout] 1205 | | context: *mut c_void, [INFO] [stdout] 1206 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1209 | | flags: c_int, [INFO] [stdout] 1210 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_sendv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1217:5 [INFO] [stdout] | [INFO] [stdout] 1217 | rdma_post_sendv(id, context, &mut sge, nsge, flags) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1234:15 [INFO] [stdout] | [INFO] [stdout] 1234 | lkey: (*mr).lkey, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1221:1 [INFO] [stdout] | [INFO] [stdout] 1221 | / pub unsafe fn rdma_post_read( [INFO] [stdout] 1222 | | id: *mut rdma_cm_id, [INFO] [stdout] 1223 | | context: *mut c_void, [INFO] [stdout] 1224 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1229 | | rkey: u32, [INFO] [stdout] 1230 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_readv` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1237:5 [INFO] [stdout] | [INFO] [stdout] 1237 | rdma_post_readv(id, context, &mut sge, nsge, flags, remote_addr, rkey) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1254:34 [INFO] [stdout] | [INFO] [stdout] 1254 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1241:1 [INFO] [stdout] | [INFO] [stdout] 1241 | / pub unsafe fn rdma_post_write( [INFO] [stdout] 1242 | | id: *mut rdma_cm_id, [INFO] [stdout] 1243 | | context: *mut c_void, [INFO] [stdout] 1244 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1249 | | rkey: u32, [INFO] [stdout] 1250 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_post_writev` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1257:5 [INFO] [stdout] | [INFO] [stdout] 1257 | rdma_post_writev(id, context, &mut sge, nsge, flags, remote_addr, rkey) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1274:34 [INFO] [stdout] | [INFO] [stdout] 1274 | lkey: if !mr.is_null() { (*mr).lkey } else { 0 }, [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1261:1 [INFO] [stdout] | [INFO] [stdout] 1261 | / pub unsafe fn rdma_post_ud_send( [INFO] [stdout] 1262 | | id: *mut rdma_cm_id, [INFO] [stdout] 1263 | | context: *mut c_void, [INFO] [stdout] 1264 | | addr: *mut c_void, [INFO] [stdout] ... | [INFO] [stdout] 1269 | | remote_qpn: u32, [INFO] [stdout] 1270 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1277:18 [INFO] [stdout] | [INFO] [stdout] 1277 | let mut wr = std::mem::zeroed::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:5 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_post_send` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:19 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1293:33 [INFO] [stdout] | [INFO] [stdout] 1293 | rdma_seterrno(ibv_post_send((*id).qp, &mut wr, &mut bad)) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1306:15 [INFO] [stdout] | [INFO] [stdout] 1306 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1297:1 [INFO] [stdout] | [INFO] [stdout] 1297 | pub unsafe fn rdma_get_send_comp(id: *mut rdma_cm_id, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1306:27 [INFO] [stdout] | [INFO] [stdout] 1306 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_req_notify_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1310:15 [INFO] [stdout] | [INFO] [stdout] 1310 | ret = ibv_req_notify_cq((*id).send_cq, solicited_only); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1310:33 [INFO] [stdout] | [INFO] [stdout] 1310 | ret = ibv_req_notify_cq((*id).send_cq, solicited_only); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1312:20 [INFO] [stdout] | [INFO] [stdout] 1312 | return rdma_seterrno(ret); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1314:15 [INFO] [stdout] | [INFO] [stdout] 1314 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1314:27 [INFO] [stdout] | [INFO] [stdout] 1314 | ret = ibv_poll_cq((*id).send_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_cq_event` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1318:15 [INFO] [stdout] | [INFO] [stdout] 1318 | ret = ibv_get_cq_event((*id).send_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1318:32 [INFO] [stdout] | [INFO] [stdout] 1318 | ret = ibv_get_cq_event((*id).send_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1323:23 [INFO] [stdout] | [INFO] [stdout] 1323 | assert!(cq == (*id).send_cq && context as *mut rdma_cm_id == id); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_ack_cq_events` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1324:9 [INFO] [stdout] | [INFO] [stdout] 1324 | ibv_ack_cq_events((*id).send_cq, nevents); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1324:27 [INFO] [stdout] | [INFO] [stdout] 1324 | ibv_ack_cq_events((*id).send_cq, nevents); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1327:9 [INFO] [stdout] | [INFO] [stdout] 1327 | rdma_seterrno(ret) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1342:15 [INFO] [stdout] | [INFO] [stdout] 1342 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:1334:1 [INFO] [stdout] | [INFO] [stdout] 1334 | pub unsafe fn rdma_get_recv_comp(id: *mut rdma_cm_id, wc: *mut ibv_wc) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1342:27 [INFO] [stdout] | [INFO] [stdout] 1342 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_req_notify_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1346:15 [INFO] [stdout] | [INFO] [stdout] 1346 | ret = ibv_req_notify_cq((*id).recv_cq, solicited_only); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1346:33 [INFO] [stdout] | [INFO] [stdout] 1346 | ret = ibv_req_notify_cq((*id).recv_cq, solicited_only); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1348:20 [INFO] [stdout] | [INFO] [stdout] 1348 | return rdma_seterrno(ret); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::ibv_poll_cq` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1350:15 [INFO] [stdout] | [INFO] [stdout] 1350 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1350:27 [INFO] [stdout] | [INFO] [stdout] 1350 | ret = ibv_poll_cq((*id).recv_cq, num_entries, wc); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_cq_event` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1354:15 [INFO] [stdout] | [INFO] [stdout] 1354 | ret = ibv_get_cq_event((*id).recv_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1354:32 [INFO] [stdout] | [INFO] [stdout] 1354 | ret = ibv_get_cq_event((*id).recv_cq_channel, &mut cq, &mut context); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1359:23 [INFO] [stdout] | [INFO] [stdout] 1359 | assert!(cq == (*id).recv_cq && context as *mut rdma_cm_id == id); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_ack_cq_events` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1360:9 [INFO] [stdout] | [INFO] [stdout] 1360 | ibv_ack_cq_events((*id).recv_cq, nevents); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1360:27 [INFO] [stdout] | [INFO] [stdout] 1360 | ibv_ack_cq_events((*id).recv_cq, nevents); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::rdma_seterrno` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:1363:9 [INFO] [stdout] | [INFO] [stdout] 1363 | rdma_seterrno(ret) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 579 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating examples/server.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `rdma_sys` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/opcode.rs [INFO] [stderr] * src/verbs.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:10 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/opcode.rs:5:33 [INFO] [stderr] | [INFO] [stderr] 5 | ($transport: expr_2021, $op : expr_2021 ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:254:6 [INFO] [stderr] | [INFO] [stderr] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/verbs.rs:272:6 [INFO] [stderr] | [INFO] [stderr] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 4 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:73841 [INFO] [stdout] | [INFO] [stdout] 3 | ...= 23 ; } extern "C" { pub fn ibv_wc_status_str (status : ibv_wc_status :: Type) -> * const :: std :: os :: raw :: c_char ; } pub mod i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:93998 [INFO] [stdout] | [INFO] [stdout] 3 | ...S : Type = 24 ; } extern "C" { pub fn ibv_rate_to_mult (rate : ibv_rate :: Type) -> :: std :: os :: raw :: c_int ; } extern "C" { pub ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:94097 [INFO] [stdout] | [INFO] [stdout] 3 | ... raw :: c_int ; } extern "C" { pub fn ibv_rate_to_mbps (rate : ibv_rate :: Type) -> :: std :: os :: raw :: c_int ; } impl ibv_srq_attr... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:185474 [INFO] [stdout] | [INFO] [stdout] 3 | ...tringify ! (wr_abort))) ; } extern "C" { pub fn ibv_qp_to_qp_ex (qp : * mut ibv_qp) -> * mut ibv_qp_ex ; } # [repr (C)] # [derive (Cop... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297561 [INFO] [stdout] | [INFO] [stdout] 3 | ...)) ; } extern "C" { pub fn ibv_get_device_list (num_devices : * mut :: std :: os :: raw :: c_int) -> * mut * mut ibv_device ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297682 [INFO] [stdout] | [INFO] [stdout] 3 | ...> * mut * mut ibv_device ; } extern "C" { pub fn ibv_free_device_list (list : * mut * mut ibv_device) ; } extern "C" { pub fn ibv_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating examples/client.rs from 2021 edition to 2024 [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297759 [INFO] [stdout] | [INFO] [stdout] 3 | ...evice) ; } extern "C" { pub fn ibv_get_device_name (device : * mut ibv_device) -> * const :: std :: os :: raw :: c_char ; } extern "C"... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297872 [INFO] [stdout] | [INFO] [stdout] 3 | ... :: c_char ; } extern "C" { pub fn ibv_get_device_index (device : * mut ibv_device) -> :: std :: os :: raw :: c_int ; } extern "C" { p... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:297977 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: os :: raw :: c_int ; } extern "C" { pub fn ibv_get_device_guid (device : * mut ibv_device) -> __be64 ; } extern "C" { pub fn ibv_op... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298059 [INFO] [stdout] | [INFO] [stdout] 3 | ..._device) -> __be64 ; } extern "C" { pub fn ibv_open_device (device : * mut ibv_device) -> * mut ibv_context ; } extern "C" { pub fn ib... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298148 [INFO] [stdout] | [INFO] [stdout] 3 | ...ibv_context ; } extern "C" { pub fn ibv_close_device (context : * mut ibv_context) -> :: std :: os :: raw :: c_int ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298251 [INFO] [stdout] | [INFO] [stdout] 3 | ...aw :: c_int ; } extern "C" { pub fn ibv_import_device (cmd_fd : :: std :: os :: raw :: c_int) -> * mut ibv_context ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298354 [INFO] [stdout] | [INFO] [stdout] 3 | ...ibv_context ; } extern "C" { pub fn ibv_import_pd (context : * mut ibv_context , pd_handle : u32) -> * mut ibv_pd ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298456 [INFO] [stdout] | [INFO] [stdout] 3 | ...pd_handle : u32) -> * mut ibv_pd ; } extern "C" { pub fn ibv_unimport_pd (pd : * mut ibv_pd) ; } extern "C" { pub fn ibv_import_mr (pd... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298516 [INFO] [stdout] | [INFO] [stdout] 3 | ... : * mut ibv_pd) ; } extern "C" { pub fn ibv_import_mr (pd : * mut ibv_pd , mr_handle : u32) -> * mut ibv_mr ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298608 [INFO] [stdout] | [INFO] [stdout] 3 | ...mr_handle : u32) -> * mut ibv_mr ; } extern "C" { pub fn ibv_unimport_mr (mr : * mut ibv_mr) ; } extern "C" { pub fn ibv_import_dm (co... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298668 [INFO] [stdout] | [INFO] [stdout] 3 | ...mut ibv_mr) ; } extern "C" { pub fn ibv_import_dm (context : * mut ibv_context , dm_handle : u32) -> * mut ibv_dm ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298770 [INFO] [stdout] | [INFO] [stdout] 3 | ...dm_handle : u32) -> * mut ibv_dm ; } extern "C" { pub fn ibv_unimport_dm (dm : * mut ibv_dm) ; } extern "C" { pub fn ibv_get_async_eve... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298830 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_async_event (context : * mut ibv_context , event : * mut ibv_async_event) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:298968 [INFO] [stdout] | [INFO] [stdout] 3 | ...td :: os :: raw :: c_int ; } extern "C" { pub fn ibv_ack_async_event (event : * mut ibv_async_event) ; } extern "C" { pub fn ibv_query... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299044 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_device (context : * mut ibv_context , device_attr : * mut ibv_device_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299185 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_port (context : * mut ibv_context , port_num : u8 , port_attr : * mut _compat_ibv_port_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299344 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_gid (context : * mut ibv_context , port_num : u8 , index : :: std :: os :: raw :: c_int , gid : * mut ibv_gid) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299521 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_pkey (context : * mut ibv_context , port_num : u8 , index : :: std :: os :: raw :: c_int , pkey : * mut __be16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299699 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_pkey_index (context : * mut ibv_context , port_num : u8 , pkey : __be16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299836 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: os :: raw :: c_int ; } extern "C" { pub fn ibv_alloc_pd (context : * mut ibv_context) -> * mut ibv_pd ; } extern "C" { pub fn ibv_d... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:299919 [INFO] [stdout] | [INFO] [stdout] 3 | ...) -> * mut ibv_pd ; } extern "C" { pub fn ibv_dealloc_pd (pd : * mut ibv_pd) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300010 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr_iova2 (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , iova : u64 , access : :: std :: os :: raw :: c_uint) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300203 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300376 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_mr_iova (pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , iova : u64 , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:300567 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_reg_dmabuf_mr (pd : * mut ibv_pd , offset : u64 , length : usize , iova : u64 , fd : :: std :: os :: raw :: c_int , access : :: std :: os :: raw :: c_int) -> * mut ibv_mr ; } pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301113 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_rereg_mr (mr : * mut ibv_mr , flags : :: std :: os :: raw :: c_int , pd : * mut ibv_pd , addr : * mut :: std :: os :: raw :: c_void , length : usize , access : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301363 [INFO] [stdout] | [INFO] [stdout] 3 | ...os :: raw :: c_int ; } extern "C" { pub fn ibv_dereg_mr (mr : * mut ibv_mr) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ib... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301452 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn ibv_create_comp_channel (context : * mut ibv_context) -> * mut ibv_comp_channel ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301556 [INFO] [stdout] | [INFO] [stdout] 3 | ...nnel ; } extern "C" { pub fn ibv_destroy_comp_channel (channel : * mut ibv_comp_channel) -> :: std :: os :: raw :: c_int ; } extern "C... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301672 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_create_cq (context : * mut ibv_context , cqe : :: std :: os :: raw :: c_int , cq_context : * mut :: std :: os :: raw :: c_void , channel : * mut ibv_comp_channel , comp_vector : :: std :: os :: raw :: c_int) -> * mut ibv_cq ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:301924 [INFO] [stdout] | [INFO] [stdout] 3 | ...; } extern "C" { pub fn ibv_resize_cq (cq : * mut ibv_cq , cqe : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ext... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302051 [INFO] [stdout] | [INFO] [stdout] 3 | ...s :: raw :: c_int ; } extern "C" { pub fn ibv_destroy_cq (cq : * mut ibv_cq) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302142 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_get_cq_event (channel : * mut ibv_comp_channel , cq : * mut * mut ibv_cq , cq_context : * mut * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302333 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn ibv_ack_cq_events (cq : * mut ibv_cq , nevents : :: std :: os :: raw :: c_uint) ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302437 [INFO] [stdout] | [INFO] [stdout] 3 | ...nt) ; } extern "C" { pub fn ibv_create_srq (pd : * mut ibv_pd , srq_init_attr : * mut ibv_srq_init_attr) -> * mut ibv_srq ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302555 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_modify_srq (srq : * mut ibv_srq , srq_attr : * mut ibv_srq_attr , srq_attr_mask : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302727 [INFO] [stdout] | [INFO] [stdout] 3 | ... ; } extern "C" { pub fn ibv_query_srq (srq : * mut ibv_srq , srq_attr : * mut ibv_srq_attr) -> :: std :: os :: raw :: c_int ; } exter... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302851 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: raw :: c_int ; } extern "C" { pub fn ibv_destroy_srq (srq : * mut ibv_srq) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:302945 [INFO] [stdout] | [INFO] [stdout] 3 | ...c_int ; } extern "C" { pub fn ibv_create_qp (pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> * mut ibv_qp ; } extern "C"... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303059 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_modify_qp (qp : * mut ibv_qp , attr : * mut ibv_qp_attr , attr_mask : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303219 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_qp_data_in_order (qp : * mut ibv_qp , op : ibv_wr_opcode :: Type , flags : u32) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303365 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_query_qp (qp : * mut ibv_qp , attr : * mut ibv_qp_attr , attr_mask : :: std :: os :: raw :: c_int , init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303561 [INFO] [stdout] | [INFO] [stdout] 3 | ...s :: raw :: c_int ; } extern "C" { pub fn ibv_destroy_qp (qp : * mut ibv_qp) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303652 [INFO] [stdout] | [INFO] [stdout] 3 | ...raw :: c_int ; } extern "C" { pub fn ibv_create_ah (pd : * mut ibv_pd , attr : * mut ibv_ah_attr) -> * mut ibv_ah ; } extern "C" { pub... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303753 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_init_ah_from_wc (context : * mut ibv_context , port_num : u8 , wc : * mut ibv_wc , grh : * mut ibv_grh , ah_attr : * mut ibv_ah_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:303947 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_create_ah_from_wc (pd : * mut ibv_pd , wc : * mut ibv_wc , grh : * mut ibv_grh , port_num : u8) -> * mut ibv_ah ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304087 [INFO] [stdout] | [INFO] [stdout] 3 | ...) -> * mut ibv_ah ; } extern "C" { pub fn ibv_destroy_ah (ah : * mut ibv_ah) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304178 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_attach_mcast (qp : * mut ibv_qp , gid : * const ibv_gid , lid : u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304307 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_detach_mcast (qp : * mut ibv_qp , gid : * const ibv_gid , lid : u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304436 [INFO] [stdout] | [INFO] [stdout] 3 | ... std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_fork_init () -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_is_for... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304509 [INFO] [stdout] | [INFO] [stdout] 3 | ...: std :: os :: raw :: c_int ; } extern "C" { pub fn ibv_is_fork_initialized () -> ibv_fork_status ; } extern "C" { pub fn ibv_node_typ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304579 [INFO] [stdout] | [INFO] [stdout] 3 | ...tus ; } extern "C" { pub fn ibv_node_type_str (node_type : ibv_node_type :: Type) -> * const :: std :: os :: raw :: c_char ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304698 [INFO] [stdout] | [INFO] [stdout] 3 | ...r ; } extern "C" { pub fn ibv_port_state_str (port_state : ibv_port_state :: Type) -> * const :: std :: os :: raw :: c_char ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304820 [INFO] [stdout] | [INFO] [stdout] 3 | ...: c_char ; } extern "C" { pub fn ibv_event_type_str (event : ibv_event_type) -> * const :: std :: os :: raw :: c_char ; } extern "C" {... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:304929 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn ibv_resolve_eth_l2_from_gid (context : * mut ibv_context , attr : * mut ibv_ah_attr , eth_mac : * mut u8 , vid : * mut u16) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:305109 [INFO] [stdout] | [INFO] [stdout] 3 | ...: c_int ; } extern "C" { pub fn ibv_set_ece (qp : * mut ibv_qp , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern "C" {... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:305219 [INFO] [stdout] | [INFO] [stdout] 3 | ... c_int ; } extern "C" { pub fn ibv_query_ece (qp : * mut ibv_qp , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } pub type so... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348432 [INFO] [stdout] | [INFO] [stdout] 3 | ..., stringify ! (addr))) ; } extern "C" { pub fn rdma_create_event_channel () -> * mut rdma_event_channel ; } extern "C" { pub fn rdma_d... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348513 [INFO] [stdout] | [INFO] [stdout] 3 | ...rdma_event_channel ; } extern "C" { pub fn rdma_destroy_event_channel (channel : * mut rdma_event_channel) ; } extern "C" { pub fn rdm... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348601 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_id (channel : * mut rdma_event_channel , id : * mut * mut rdma_cm_id , context : * mut :: std :: os :: raw :: c_void , ps : rdma_port_space :: Type) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:348818 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_ep (id : * mut * mut rdma_cm_id , res : * mut rdma_addrinfo , pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349007 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_ep (id : * mut rdma_cm_id) ; } extern "C" { pub fn rdma_destroy_id... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349071 [INFO] [stdout] | [INFO] [stdout] 3 | ...ut rdma_cm_id) ; } extern "C" { pub fn rdma_destroy_id (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349167 [INFO] [stdout] | [INFO] [stdout] 3 | ...int ; } extern "C" { pub fn rdma_bind_addr (id : * mut rdma_cm_id , addr : * mut sockaddr) -> :: std :: os :: raw :: c_int ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349286 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_resolve_addr (id : * mut rdma_cm_id , src_addr : * mut sockaddr , dst_addr : * mut sockaddr , timeout_ms : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349484 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_resolve_route (id : * mut rdma_cm_id , timeout_ms : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349627 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_qp (id : * mut rdma_cm_id , pd : * mut ibv_pd , qp_init_attr : * mut ibv_qp_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349782 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_qp_ex (id : * mut rdma_cm_id , qp_init_attr : * mut ibv_qp_init_attr_ex) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349923 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_qp (id : * mut rdma_cm_id) ; } extern "C" { pub fn rdma_connect (i... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:349987 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_connect (id : * mut rdma_cm_id , conn_param : * mut rdma_conn_param) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350117 [INFO] [stdout] | [INFO] [stdout] 3 | ...:: raw :: c_int ; } extern "C" { pub fn rdma_establish (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350212 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_listen (id : * mut rdma_cm_id , backlog : :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350345 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_get_request (listen : * mut rdma_cm_id , id : * mut * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350476 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_accept (id : * mut rdma_cm_id , conn_param : * mut rdma_conn_param) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350605 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_reject (id : * mut rdma_cm_id , private_data : * const :: std :: os :: raw :: c_void , private_data_len : u8) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350776 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_reject_ece (id : * mut rdma_cm_id , private_data : * const :: std :: os :: raw :: c_void , private_data_len : u8) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:350951 [INFO] [stdout] | [INFO] [stdout] 3 | ..._int ; } extern "C" { pub fn rdma_notify (id : * mut rdma_cm_id , event : ibv_event_type) -> :: std :: os :: raw :: c_int ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351068 [INFO] [stdout] | [INFO] [stdout] 3 | ...: raw :: c_int ; } extern "C" { pub fn rdma_disconnect (id : * mut rdma_cm_id) -> :: std :: os :: raw :: c_int ; } extern "C" { pub fn... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351164 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_join_multicast (id : * mut rdma_cm_id , addr : * mut sockaddr , context : * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351336 [INFO] [stdout] | [INFO] [stdout] 3 | ... ; } extern "C" { pub fn rdma_leave_multicast (id : * mut rdma_cm_id , addr : * mut sockaddr) -> :: std :: os :: raw :: c_int ; } exte... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351461 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_join_multicast_ex (id : * mut rdma_cm_id , mc_join_attr : * mut rdma_cm_join_mc_attr_ex , context : * mut :: std :: os :: raw :: c_void) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351659 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_get_cm_event (channel : * mut rdma_event_channel , event : * mut * mut rdma_cm_event) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351806 [INFO] [stdout] | [INFO] [stdout] 3 | ...w :: c_int ; } extern "C" { pub fn rdma_ack_cm_event (event : * mut rdma_cm_event) -> :: std :: os :: raw :: c_int ; } extern "C" { pu... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351910 [INFO] [stdout] | [INFO] [stdout] 3 | ...td :: os :: raw :: c_int ; } extern "C" { pub fn rdma_get_src_port (id : * mut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:351986 [INFO] [stdout] | [INFO] [stdout] 3 | ...ut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_dst_port (id : * mut rdma_cm_id) -> __be16 ; } extern "C" { pub fn rdma_get_... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352062 [INFO] [stdout] | [INFO] [stdout] 3 | ...e16 ; } extern "C" { pub fn rdma_get_devices (num_devices : * mut :: std :: os :: raw :: c_int) -> * mut * mut ibv_context ; } extern ... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352181 [INFO] [stdout] | [INFO] [stdout] 3 | ...> * mut * mut ibv_context ; } extern "C" { pub fn rdma_free_devices (list : * mut * mut ibv_context) ; } extern "C" { pub fn rdma_even... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352256 [INFO] [stdout] | [INFO] [stdout] 3 | ...ext) ; } extern "C" { pub fn rdma_event_str (event : rdma_cm_event_type :: Type) -> * const :: std :: os :: raw :: c_char ; } extern "... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352373 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_set_option (id : * mut rdma_cm_id , level : :: std :: os :: raw :: c_int , optname : :: std :: os :: raw :: c_int , optval : * mut :: std :: os :: raw :: c_void , optlen : usize) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352613 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_migrate_id (id : * mut rdma_cm_id , channel : * mut rdma_event_channel) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352746 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_getaddrinfo (node : * const :: std :: os :: raw :: c_char , service : * const :: std :: os :: raw :: c_char , hints : * const rdma_addrinfo , res : * mut * mut rdma_addrinfo) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:352982 [INFO] [stdout] | [INFO] [stdout] 3 | ...: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_freeaddrinfo (res : * mut rdma_addrinfo) ; } extern "C" { pub fn rdma_init_qp... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353052 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_init_qp_attr (id : * mut rdma_cm_id , qp_attr : * mut ibv_qp_attr , qp_attr_mask : * mut :: std :: os :: raw :: c_int) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353232 [INFO] [stdout] | [INFO] [stdout] 3 | ...nt ; } extern "C" { pub fn rdma_set_local_ece (id : * mut rdma_cm_id , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353353 [INFO] [stdout] | [INFO] [stdout] 3 | ...t ; } extern "C" { pub fn rdma_get_remote_ece (id : * mut rdma_cm_id , ece : * mut ibv_ece) -> :: std :: os :: raw :: c_int ; } extern... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353475 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_srq (id : * mut rdma_cm_id , pd : * mut ibv_pd , attr : * mut ibv_srq_init_attr) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353624 [INFO] [stdout] | [INFO] [stdout] 3 | ... } extern "C" { pub fn rdma_create_srq_ex (id : * mut rdma_cm_id , attr : * mut ibv_srq_init_attr_ex) -> :: std :: os :: raw :: c_int ; } ex... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:353759 [INFO] [stdout] | [INFO] [stdout] 3 | ...> :: std :: os :: raw :: c_int ; } extern "C" { pub fn rdma_destroy_srq (id : * mut rdma_cm_id) ; } # [repr (C)] # [derive (Copy , Clo... [INFO] [stdout] | -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:22 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr_2021, $op : expr ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/opcode.rs:5:34 [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 5 | ($transport: expr, $op : expr_2021 ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:254:11 [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr, $container:path, $field:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 254 | ($ptr:expr_2021, $container:path, $field:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/verbs.rs:272:11 [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr, $field:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 272 | ($vcr:expr_2021, $field:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:279 [INFO] [stdout] | [INFO] [stdout] 3 | ...ub unsafe fn as_ref (& self) -> & T { :: std :: mem :: transmute (self) } # [inline] pub unsafe fn as_mut (& mut self) -> & mut T { ::... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:240 [INFO] [stdout] | [INFO] [stdout] 3 | ...d (:: std :: marker :: PhantomData) } # [inline] pub unsafe fn as_ref (& self) -> & T { :: std :: mem :: transmute (self) } # [inline]... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:373 [INFO] [stdout] | [INFO] [stdout] 3 | ...e fn as_mut (& mut self) -> & mut T { :: std :: mem :: transmute (self) } } impl < T > :: std :: default :: Default for __BindgenUnion... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> /opt/rustwide/target/debug/build/rdma-sys-2a49578a5b84d1c6/out/bindings.rs:3:326 [INFO] [stdout] | [INFO] [stdout] 3 | ... std :: mem :: transmute (self) } # [inline] pub unsafe fn as_mut (& mut self) -> & mut T { :: std :: mem :: transmute (self) } } impl... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / pub unsafe fn ibv_wr_atomic_cmp_swp( [INFO] [stdout] 13 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 14 | | rkey: u32, [INFO] [stdout] 15 | | remote_addr: u64, [INFO] [stdout] 16 | | compare: u64, [INFO] [stdout] 17 | | swap: u64, [INFO] [stdout] 18 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:19:5 [INFO] [stdout] | [INFO] [stdout] 19 | (*qp).wr_atomic_cmp_swp.unwrap()(qp, rkey, remote_addr, compare, swap); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn ibv_wr_atomic_fetch_add(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64, add: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:24:5 [INFO] [stdout] | [INFO] [stdout] 24 | (*qp).wr_atomic_fetch_add.unwrap()(qp, rkey, remote_addr, add); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:28:1 [INFO] [stdout] | [INFO] [stdout] 28 | / pub unsafe fn ibv_wr_bind_mw( [INFO] [stdout] 29 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 30 | | mw: *mut ibv_mw, [INFO] [stdout] 31 | | rkey: u32, [INFO] [stdout] 32 | | bind_info: *const ibv_mw_bind_info, [INFO] [stdout] 33 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:34:5 [INFO] [stdout] | [INFO] [stdout] 34 | (*qp).wr_bind_mw.unwrap()(qp, mw, rkey, bind_info); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:38:1 [INFO] [stdout] | [INFO] [stdout] 38 | pub unsafe fn ibv_wr_local_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:39:5 [INFO] [stdout] | [INFO] [stdout] 39 | (*qp).wr_local_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn ibv_wr_rdma_read(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:44:5 [INFO] [stdout] | [INFO] [stdout] 44 | (*qp).wr_rdma_read.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | pub unsafe fn ibv_wr_rdma_write(qp: *mut ibv_qp_ex, rkey: u32, remote_addr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | (*qp).wr_rdma_write.unwrap()(qp, rkey, remote_addr); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:53:1 [INFO] [stdout] | [INFO] [stdout] 53 | / pub unsafe fn ibv_wr_rdma_write_imm( [INFO] [stdout] 54 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 55 | | rkey: u32, [INFO] [stdout] 56 | | remote_addr: u64, [INFO] [stdout] 57 | | imm_data: __be32, [INFO] [stdout] 58 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | (*qp).wr_rdma_write_imm.unwrap()(qp, rkey, remote_addr, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:63:1 [INFO] [stdout] | [INFO] [stdout] 63 | pub unsafe fn ibv_wr_send(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | (*qp).wr_send.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | pub unsafe fn ibv_wr_send_imm(qp: *mut ibv_qp_ex, imm_data: __be32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:69:5 [INFO] [stdout] | [INFO] [stdout] 69 | (*qp).wr_send_imm.unwrap()(qp, imm_data); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:73:1 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn ibv_wr_send_inv(qp: *mut ibv_qp_ex, invalidate_rkey: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | (*qp).wr_send_inv.unwrap()(qp, invalidate_rkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn ibv_wr_send_tso(qp: *mut ibv_qp_ex, hdr: *mut c_void, hdr_sz: u16, mss: u16) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | (*qp).wr_send_tso.unwrap()(qp, hdr, hdr_sz, mss); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:83:1 [INFO] [stdout] | [INFO] [stdout] 83 | / pub unsafe fn ibv_wr_set_ud_addr( [INFO] [stdout] 84 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 85 | | ah: *mut ibv_ah, [INFO] [stdout] 86 | | remote_qpn: u32, [INFO] [stdout] 87 | | remote_qkey: u32, [INFO] [stdout] 88 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:89:5 [INFO] [stdout] | [INFO] [stdout] 89 | (*qp).wr_set_ud_addr.unwrap()(qp, ah, remote_qpn, remote_qkey); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:93:1 [INFO] [stdout] | [INFO] [stdout] 93 | pub unsafe fn ibv_wr_set_xrc_srqn(qp: *mut ibv_qp_ex, remote_srqn: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:94:5 [INFO] [stdout] | [INFO] [stdout] 94 | (*qp).wr_set_xrc_srqn.unwrap()(qp, remote_srqn); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:98:1 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn ibv_wr_set_inline_data(qp: *mut ibv_qp_ex, addr: *mut c_void, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:99:5 [INFO] [stdout] | [INFO] [stdout] 99 | (*qp).wr_set_inline_data.unwrap()(qp, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:103:1 [INFO] [stdout] | [INFO] [stdout] 103 | / pub unsafe fn ibv_wr_set_inline_data_list( [INFO] [stdout] 104 | | qp: *mut ibv_qp_ex, [INFO] [stdout] 105 | | num_buf: usize, [INFO] [stdout] 106 | | buf_list: *const ibv_data_buf, [INFO] [stdout] 107 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | (*qp).wr_set_inline_data_list.unwrap()(qp, num_buf, buf_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:112:1 [INFO] [stdout] | [INFO] [stdout] 112 | pub unsafe fn ibv_wr_set_sge(qp: *mut ibv_qp_ex, lkey: u32, addr: u64, length: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | (*qp).wr_set_sge.unwrap()(qp, lkey, addr, length); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | pub unsafe fn ibv_wr_set_sge_list(qp: *mut ibv_qp_ex, num_sge: usize, sg_list: *const ibv_sge) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | (*qp).wr_set_sge_list.unwrap()(qp, num_sge, sg_list); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | pub unsafe fn ibv_wr_start(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | (*qp).wr_start.unwrap()(qp); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | pub unsafe fn ibv_wr_complete(qp: *mut ibv_qp_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:128:5 [INFO] [stdout] | [INFO] [stdout] 128 | (*qp).wr_complete.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:132:1 [INFO] [stdout] | [INFO] [stdout] 132 | pub unsafe fn ibv_wr_abort(qp: *mut ibv_qp_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:133:5 [INFO] [stdout] | [INFO] [stdout] 133 | (*qp).wr_abort.unwrap()(qp) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:143:1 [INFO] [stdout] | [INFO] [stdout] 143 | pub unsafe fn ibv_start_poll(cq: *mut ibv_cq_ex, attr: *mut ibv_poll_cq_attr) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:144:5 [INFO] [stdout] | [INFO] [stdout] 144 | (*cq).start_poll.unwrap()(cq, attr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | pub unsafe fn ibv_next_poll(cq: *mut ibv_cq_ex) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | (*cq).next_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:153:1 [INFO] [stdout] | [INFO] [stdout] 153 | pub unsafe fn ibv_end_poll(cq: *mut ibv_cq_ex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | (*cq).end_poll.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:158:1 [INFO] [stdout] | [INFO] [stdout] 158 | pub unsafe fn ibv_wc_read_opcode(cq: *mut ibv_cq_ex) -> ibv_wc_opcode::Type { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:159:5 [INFO] [stdout] | [INFO] [stdout] 159 | (*cq).read_opcode.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:163:1 [INFO] [stdout] | [INFO] [stdout] 163 | pub unsafe fn ibv_wc_read_vendor_err(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:164:5 [INFO] [stdout] | [INFO] [stdout] 164 | (*cq).read_vendor_err.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:168:1 [INFO] [stdout] | [INFO] [stdout] 168 | pub unsafe fn ibv_wc_read_byte_len(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:169:5 [INFO] [stdout] | [INFO] [stdout] 169 | (*cq).read_byte_len.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:173:1 [INFO] [stdout] | [INFO] [stdout] 173 | pub unsafe fn ibv_wc_read_imm_data(cq: *mut ibv_cq_ex) -> __be32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:174:5 [INFO] [stdout] | [INFO] [stdout] 174 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:178:1 [INFO] [stdout] | [INFO] [stdout] 178 | pub unsafe fn ibv_wc_read_invalidated_rkey(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | (*cq).read_imm_data.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | pub unsafe fn ibv_wc_read_qp_num(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:189:5 [INFO] [stdout] | [INFO] [stdout] 189 | (*cq).read_qp_num.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:193:1 [INFO] [stdout] | [INFO] [stdout] 193 | pub unsafe fn ibv_wc_read_src_qp(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:194:5 [INFO] [stdout] | [INFO] [stdout] 194 | (*cq).read_src_qp.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | pub unsafe fn ibv_wc_read_wc_flags(cq: *mut ibv_cq_ex) -> c_uint { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | (*cq).read_wc_flags.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | pub unsafe fn ibv_wc_read_slid(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | (*cq).read_slid.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:208:1 [INFO] [stdout] | [INFO] [stdout] 208 | pub unsafe fn ibv_wc_read_sl(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:209:5 [INFO] [stdout] | [INFO] [stdout] 209 | (*cq).read_sl.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:213:1 [INFO] [stdout] | [INFO] [stdout] 213 | pub unsafe fn ibv_wc_read_dlid_path_bits(cq: *mut ibv_cq_ex) -> u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | (*cq).read_dlid_path_bits.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:218:1 [INFO] [stdout] | [INFO] [stdout] 218 | pub unsafe fn ibv_wc_read_completion_ts(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:219:5 [INFO] [stdout] | [INFO] [stdout] 219 | (*cq).read_completion_ts.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | pub unsafe fn ibv_wc_read_completion_wallclock_ns(cq: *mut ibv_cq_ex) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:224:5 [INFO] [stdout] | [INFO] [stdout] 224 | (*cq).read_completion_wallclock_ns.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | pub unsafe fn ibv_wc_read_cvlan(cq: *mut ibv_cq_ex) -> u16 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:229:5 [INFO] [stdout] | [INFO] [stdout] 229 | (*cq).read_cvlan.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | pub unsafe fn ibv_wc_read_flow_tag(cq: *mut ibv_cq_ex) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:234:5 [INFO] [stdout] | [INFO] [stdout] 234 | (*cq).read_flow_tag.unwrap()(cq) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:238:1 [INFO] [stdout] | [INFO] [stdout] 238 | pub unsafe fn ibv_wc_read_tm_info(cq: *mut ibv_cq_ex, tm_info: *mut ibv_wc_tm_info) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:239:5 [INFO] [stdout] | [INFO] [stdout] 239 | (*cq).read_tm_info.unwrap()(cq, tm_info) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | / pub unsafe fn ibv_post_wq_recv( [INFO] [stdout] 245 | | wq: *mut ibv_wq, [INFO] [stdout] 246 | | recv_wr: *mut ibv_recv_wr, [INFO] [stdout] 247 | | bad_recv_wr: *mut *mut ibv_recv_wr, [INFO] [stdout] 248 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:249:5 [INFO] [stdout] | [INFO] [stdout] 249 | (*wq).post_recv.unwrap()(wq, recv_wr, bad_recv_wr) [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:263:8 [INFO] [stdout] | [INFO] [stdout] 263 | if (*ctx).abi_compat as usize != u32::MAX as usize { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:262:1 [INFO] [stdout] | [INFO] [stdout] 262 | unsafe fn verbs_get_ctx(ctx: *const ibv_context) -> Option<*mut verbs_context> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::sub` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:255:9 [INFO] [stdout] | [INFO] [stdout] 255 | ($ptr as *const _ as *const u8).sub(memoffset::offset_of!($container, $field)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 266 | let vcp = container_of!(ctx, verbs_context, context) as *mut _; [INFO] [stdout] | ------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `container_of` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ibv_get_device_list` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:320:5 [INFO] [stdout] | [INFO] [stdout] 320 | ibv_get_device_list(num_devices) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:317:1 [INFO] [stdout] | [INFO] [stdout] 317 | pub unsafe fn __ibv_get_device_list(num_devices: *mut c_int) -> *mut *mut ibv_device { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `verbs::verbs_get_ctx` is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:273:27 [INFO] [stdout] | [INFO] [stdout] 273 | if let Some(vc) = verbs_get_ctx($vcr) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/verbs.rs:328:1 [INFO] [stdout] | [INFO] [stdout] 328 | / pub unsafe fn ___ibv_query_port( [INFO] [stdout] 329 | | context: *mut ibv_context, [INFO] [stdout] 330 | | port_num: u8, [INFO] [stdout] 331 | | port_attr: *mut ibv_port_attr, [INFO] [stdout] 332 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:16 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:274:45 [INFO] [stdout] | [INFO] [stdout] 274 | if (*vc).sz < mem::size_of_val(&*vc) - memoffset::offset_of!(verbs_context, $field) { [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:277:20 [INFO] [stdout] | [INFO] [stdout] 277 | if (*vc).$field.is_some() { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 333 | let vcr = verbs_get_ctx_op!(context, query_port); [INFO] [stdout] | -------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `verbs_get_ctx_op` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/verbs.rs:336:9 [INFO] [stdout] | [WARN] too many lines in the log, truncating it