248 |
#[inline]
|
249 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
250 |
pub fn get_bytes(&self, offset: Index, dest: *mut u8, length: Index) {
|
86 |
/// Deallocate a buffer aligned on a cache size
|
87 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
88 |
pub fn dealloc_buffer_aligned(buff_ptr: *mut u8, len: Index) {
|
82 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
83 |
pub fn add_sink_component_with_initialize_method_data(
|
12 |
impl<T> SelfComponent<T> {
|
13 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
14 |
pub fn set_c_user_data_ptr(&mut self, user_data: *mut c_void) {
|
392 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
393 |
#[no_mangle]
|
47 |
///
|
48 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
49 |
pub fn cache_line_flush_with_ptr(begin_ptr: *const u8, end_ptr: *const u8) {
|
60 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
61 |
//clippy is retard
|
41 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
42 |
impl From<*mut ffi::archive> for Error {
|
102 |
// The __tt function does not dereference the pointer received.
|
103 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
104 |
pub fn tt(addr: *mut u32) -> u32 {
|
117 |
// The __ttt function does not dereference the pointer received.
|
118 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
119 |
pub fn ttt(addr: *mut u32) -> u32 {
|
133 |
// The __tta function does not dereference the pointer received.
|
134 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
135 |
pub fn tta(addr: *mut u32) -> u32 {
|
149 |
// The __ttat function does not dereference the pointer received.
|
150 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
151 |
pub fn ttat(addr: *mut u32) -> u32 {
|
252 |
/// Set CONTROL.SPSEL to 0, write `msp` to MSP, branch to `rv`.
|
253 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
254 |
#[inline(always)]
|
418 |
/// Armv8-M Architecture Reference Manual).
|
419 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
420 |
#[inline(always)]
|
433 |
/// Armv8-M Architecture Reference Manual).
|
434 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
435 |
#[inline(always)]
|
449 |
/// Armv8-M Architecture Reference Manual).
|
450 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
451 |
#[inline(always)]
|
465 |
/// Armv8-M Architecture Reference Manual).
|
466 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
467 |
#[inline(always)]
|
226 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
227 |
fn next(&self, buf: *mut bam1_t) -> Result<Option<Alignment<'a>>, AlignmentError> {
|
464 |
/// and extension [`VK_KHR_xlib_surface`](https://www.khronos.org/registry/vulkan/specs/1.0-extensions/html/vkspec.html#VK_KHR_xlib_surface)
|
465 |
#[cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
466 |
pub fn get_xlib_presentation_support_khr(&self, queue_family_index: u32, dpy: *mut xlib_types::Display, visual_id: xlib_types::VisualID) -> bool {
|
475 |
/// and extension [`VK_KHR_wayland_surface`](https://www.khronos.org/registry/vulkan/specs/1.0-extensions/html/vkspec.html#VK_KHR_wayland_surface)
|
476 |
#[cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
477 |
pub fn get_wayland_presentation_support_khr(&self, queue_family_index: u32, display: *mut wayland_types::wl_display) -> bool {
|
486 |
/// and extension [`VK_KHR_xcb_surface`](https://www.khronos.org/registry/vulkan/specs/1.0-extensions/html/vkspec.html#VK_KHR_xcb_surface)
|
487 |
#[cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
488 |
pub fn get_xcb_presentation_support_khr(&self, queue_family_index: u32, connection: *mut xcb_types::xcb_connection_t, visual_id: xcb_types::xcb_visualid_t) -> bool {
|
497 |
/// and extension [`VK_KHR_mir_surface`](https://www.khronos.org/registry/vulkan/specs/1.0-extensions/html/vkspec.html#VK_KHR_mir_surface)
|
498 |
#[cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
499 |
pub fn get_mir_presentation_support_khr(&self, queue_family_index: u32, connection: *mut mir_types::MirConnection) -> bool {
|
51 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
52 |
pub fn create_function<'a>(
|
77 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
78 |
pub fn create_function_template<'a>(
|
221 |
/// Starts a new thread in this process with the given entry point and argument and returns the thread handle.
|
222 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // not relevant as ptr is dereffed in the target process and any invalid deref will only result in an io::Error.
|
223 |
fn start_remote_thread<T>(
|
19 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
20 |
#[no_mangle]
|
2 |
/// Exported strlen(const char *s)
|
3 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
4 |
#[no_mangle]
|
16 |
/// Exported strnlen(const char *s, size_t maxlen)
|
17 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
18 |
#[no_mangle]
|
387 |
{
|
388 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
389 |
pub fn subscribe_raw(
|
34 |
#[wasm_bindgen]
|
35 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
36 |
pub fn receive_transfer_closure(
|
80 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
81 |
pub fn set_hdfs_builder(&self, builder: *mut hdfsBuilder) -> bool {
|
80 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
81 |
pub fn set_hdfs_builder(&self, builder: *mut hdfsBuilder) -> bool {
|
23 |
#[no_mangle]
|
24 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
25 |
pub extern "C" fn google(query: *const c_char) -> *mut returned {
|
61 |
#[no_mangle]
|
62 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
63 |
pub extern "C" fn freeGResults(ret: *mut returned) {
|
39 |
}
|
40 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
41 |
impl Container {
|
33 |
}
|
34 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
35 |
impl RowSet {
|
64 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
65 |
pub fn get_row_data(row: *mut GSRow, vector: &mut Vec<Value>, typeList: &[Type]) -> i32 {
|
259 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
260 |
impl FieldBinder for Value {
|
578 |
/// the previous value. On success this value is guaranteed to be equal to `current`.
|
579 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
580 |
pub fn compare_exchange(
|
610 |
/// the previous value. On success this value is guaranteed to be equal to `current`.
|
611 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
612 |
pub fn compare_exchange_weak(
|
16 |
#[inline]
|
17 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
18 |
fn from(ptr: *const c_char) -> Self {
|
11 |
#[inline]
|
12 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
13 |
fn from(ptr: *const T) -> Self {
|
22 |
#[cfg(not(target_family = "wasm"))]
|
23 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
24 |
#[no_mangle]
|
321 |
#[no_mangle]
|
322 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
323 |
pub extern "C" fn http_desync_guardian_analyze_raw_request(
|
391 |
#[no_mangle]
|
392 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
393 |
pub extern "C" fn http_desync_guardian_print_request(
|
41 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
42 |
#[inline]
|
47 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
48 |
#[inline]
|
29 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
30 |
#[no_mangle]
|
30 |
/// Backed by [`DuplicateHandle`]. Doesn't require unsafe code since `DuplicateHandle` never leads to undefined behavior if the `lpTargetHandle` parameter is a valid pointer, only creates an error.
|
31 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // Handles are not pointers, they have handle checks
|
32 |
fn share(&self, reciever: HANDLE) -> io::Result<HANDLE> {
|
478 |
impl IonCValueWriter for IonCWriterHandle<'_> {
|
479 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
480 |
#[inline]
|
553 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
554 |
#[inline]
|
39 |
}
|
40 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
41 |
impl Container {
|
33 |
}
|
34 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
35 |
impl RowSet {
|
64 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
65 |
pub fn get_row_data(row: *mut GSRow, vector: &mut Vec<Value>, typeList: &[Type]) -> i32 {
|
259 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
260 |
impl FieldBinder for Value {
|
97 |
/// ```
|
98 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
99 |
pub const fn is_null<T: ?Sized>(ptr: *const T) -> bool {
|
128 |
/// ```
|
129 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
130 |
pub const fn new<T: ?Sized>(ptr: *mut T) -> Option<NonNull<T>> {
|
997 |
impl Handler for InProcessExecutorHandlerData {
|
998 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
999 |
fn handle(&mut self, _code: ExceptionCode, exception_pointers: *mut EXCEPTION_POINTERS) {
|
16 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
17 |
impl AsanRuntime {
|
11 |
#[allow(clippy::cast_sign_loss)]
|
12 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
13 |
pub fn __sanitizer_cov_8bit_counters_init(start: *mut u8, stop: *mut u8) {
|
6 |
#[allow(dead_code, clippy::not_unsafe_ptr_arg_deref)]
|
7 |
#[cfg(unix)]
|
100 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
101 |
pub fn add_plugin(&mut self, uri: &str, name: String) -> Result<usize, AddPluginError>{
|
12 |
/// Read value from memory address.
|
13 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
14 |
#[inline]
|
22 |
/// Write value to memory address.
|
23 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
24 |
#[inline]
|
151 |
/// Create a JS value that wraps a native pointer
|
152 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
153 |
pub fn make_foreign(&mut self, f: *mut cty::c_void) -> Val {
|
61 |
#[no_mangle]
|
62 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
63 |
pub extern "C" fn mosquitto_auth_plugin_init(
|
77 |
#[no_mangle]
|
78 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
79 |
pub extern "C" fn mosquitto_auth_plugin_cleanup(
|
91 |
#[no_mangle]
|
92 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
93 |
pub extern "C" fn mosquitto_auth_security_init(
|
130 |
#[no_mangle]
|
131 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
132 |
pub extern "C" fn mosquitto_auth_acl_check(
|
158 |
#[no_mangle]
|
159 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
160 |
pub extern "C" fn mosquitto_auth_unpwd_check(
|
238 |
impl EncoderFlush for FlushGap {
|
239 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
240 |
#[inline(always)]
|
251 |
impl EncoderFlush for FlushNoGap {
|
252 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
253 |
#[inline(always)]
|
22 |
impl<const N: usize> CallbackInfo<N> {
|
23 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
24 |
pub fn new(
|
37 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
38 |
pub fn create_iterator<T: Generator>(
|
61 |
#[doc(hidden)]
|
62 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
63 |
pub fn add_ref(env: crate::sys::napi_env, t: *mut c_void, value: RefInformation) {
|
65 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
66 |
pub fn execute_tokio_future<
|
242 |
// Optionally dereferencing it there already enforces `unsafe` context.
|
243 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
244 |
pub fn add_fd(
|
196 |
// https://github.com/neon-bindings/neon/issues/591
|
197 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
198 |
fn from_raw(env: Env, local: raw::Local) -> Self {
|
534 |
// https://github.com/neon-bindings/neon/issues/885
|
535 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
536 |
fn from_raw(env: Env, local: raw::Local) -> Self {
|
6 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
7 |
#[no_mangle]
|
39 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
40 |
#[no_mangle]
|
49 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
50 |
#[no_mangle]
|
59 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
60 |
#[no_mangle]
|
179 |
// to the kernel.
|
180 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
181 |
pub fn read(pid: Pid, addr: AddressType) -> Result<c_int> {
|
191 |
// to the kernel.
|
192 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
193 |
pub fn write(pid: Pid, addr: AddressType, data: c_int) -> Result<()> {
|
160 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
161 |
pub fn set_element(
|
176 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
177 |
pub fn get_element(&self, array: napi_value, index: u32) -> Result<napi_value, NjError> {
|
189 |
/// check if napi value is array
|
190 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
191 |
pub fn is_array(&self, array: napi_value) -> Result<bool, NjError> {
|
199 |
/// check if napi value is array buffer
|
200 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
201 |
pub fn is_array_buffer(&self, array: napi_value) -> Result<bool, NjError> {
|
209 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
210 |
pub fn is_buffer(&self, n_value: napi_value) -> Result<bool, NjError> {
|
12 |
impl<'a> JSValue<'a> for BigInt {
|
13 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
14 |
fn convert_to_rust(env: &'a JsEnv, js_value: napi_value) -> Result<Self, NjError> {
|
230 |
impl JSValue<'_> for f64 {
|
231 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
232 |
fn convert_to_rust(env: &JsEnv, js_value: napi_value) -> Result<Self, NjError> {
|
247 |
impl JSValue<'_> for i32 {
|
248 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
249 |
fn convert_to_rust(env: &JsEnv, js_value: napi_value) -> Result<Self, NjError> {
|
264 |
impl JSValue<'_> for u32 {
|
265 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
266 |
fn convert_to_rust(env: &JsEnv, js_value: napi_value) -> Result<Self, NjError> {
|
281 |
impl JSValue<'_> for i64 {
|
282 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
283 |
fn convert_to_rust(env: &JsEnv, js_value: napi_value) -> Result<Self, NjError> {
|
112 |
#[inline]
|
113 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
114 |
pub unsafe fn own_back<T>(pointer: *mut T) -> Result<T, PointerError> {
|
49 |
impl From<*const ffi::otc_connection> for Connection {
|
50 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
51 |
fn from(ptr: *const ffi::otc_connection) -> Connection {
|
121 |
impl From<*const ffi::otc_stream> for Stream {
|
122 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
123 |
fn from(ptr: *const ffi::otc_stream) -> Stream {
|
291 |
impl From<*const ffi::otc_video_frame> for VideoFrame {
|
292 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
293 |
fn from(ptr: *const ffi::otc_video_frame) -> Self {
|
476 |
/// `fn_` is called on the new thread.
|
477 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
478 |
pub fn create_thread(
|
141 |
/// `fn_` is called on the new thread.
|
142 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
143 |
pub fn create_thread(
|
228 |
#[allow(clippy::missing_safety_doc)]
|
229 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
230 |
#[no_mangle]
|
1687 |
#[no_mangle]
|
1688 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
1689 |
pub extern fn pactffi_message_with_contents(message_handle: MessageHandle, content_type: *const c_char, body: *const u8, size: size_t) {
|
104 |
#[deprecated(since = "0.1.7", note = "replaced with pactffi_create_mock_server_for_transport")]
|
105 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
106 |
pub extern fn pactffi_create_mock_server(pact_str: *const c_char, addr_str: *const c_char, tls: bool) -> i32 {
|
198 |
#[tracing::instrument(level = "trace")]
|
199 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
200 |
pub extern fn pactffi_create_mock_server_for_pact(pact: PactHandle, addr_str: *const c_char, tls: bool) -> i32 {
|
157 |
#[no_mangle]
|
158 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
159 |
pub extern fn pactffi_interaction_contents(
|
224 |
#[allow(clippy::missing_safety_doc)]
|
225 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
226 |
#[no_mangle]
|
313 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
314 |
fn to_result(self) -> anyhow::Result<libc::passwd> {
|
57 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
58 |
pub fn unsafe_set_model(&self, ptr: *const PerspectiveViewerElement) {
|
57 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
58 |
pub fn unsafe_set_model(&self, ptr: *const PerspectiveViewerElement) {
|
109 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // this is okay b/c we guard against ctid being null
|
110 |
#[inline]
|
183 |
// Used by pkgcraft-c mapping NULL pointers to the default EAPI.
|
184 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
185 |
impl IntoEapi for *const Eapi {
|
178 |
/// ```
|
179 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
180 |
pub fn set_context(&self, context: *mut c_void) -> PyResult<()> {
|
340 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
341 |
fn get_redis_version_internal(&self, force_use_rm_call: bool) -> Result<Version, RedisError> {
|
495 |
/// Will panic if `RedisModule_KeyType` or `RedisModule_ModuleTypeGetType` are missing in redismodule.h
|
496 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
497 |
pub fn verify_type(key_inner: *mut raw::RedisModuleKey, redis_type: &RedisType) -> RedisResult {
|
33 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
34 |
pub fn create_data_type(&self, ctx: *mut raw::RedisModuleCtx) -> Result<(), &str> {
|
68 |
// TODO: Move to raw
|
69 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
70 |
pub fn redis_log(ctx: *mut raw::RedisModuleCtx, msg: &str) {
|
185 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
186 |
pub fn call_reply_type(reply: *mut RedisModuleCallReply) -> ReplyType {
|
193 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
194 |
pub fn free_call_reply(reply: *mut RedisModuleCallReply) {
|
198 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
199 |
pub fn call_reply_integer(reply: *mut RedisModuleCallReply) -> c_longlong {
|
203 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
204 |
pub fn call_reply_array_element(
|
211 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
212 |
pub fn call_reply_length(reply: *mut RedisModuleCallReply) -> usize {
|
77 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
78 |
pub fn decode_args(
|
1492 |
///
|
1493 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
1494 |
pub fn protect(&mut self, sexp: SEXP) -> SEXP {
|
56 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
57 |
fn dealloc(&mut self, ptr: RawMemPtr) {
|
68 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
69 |
fn realloc(&mut self, ptr: RawMemPtr, new_size: usize) -> RawMemPtr {
|
93 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
94 |
fn usable_size(ptr: RawMemPtr) -> usize {
|
6 |
/// Tries to convert a pointer to a [`CString`] into a Rust [`str`]
|
7 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
8 |
pub fn get_str_from_pointer<'a>(ptr: *const c_char) -> Option<&'a str> {
|
258 |
impl<T> From<id> for NSArray<T> {
|
259 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
260 |
fn from(obj: id) -> Self {
|
206 |
impl<K, V> From<id> for NSDictionary<K, V> {
|
207 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
208 |
fn from(obj: id) -> Self {
|
158 |
impl<T> From<id> for NSMutableArray<T> {
|
159 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
160 |
fn from(obj: id) -> Self {
|
47 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
48 |
#[no_mangle]
|
49 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
50 |
#[no_mangle]
|
61 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
62 |
#[no_mangle]
|
587 |
/// invoked.
|
588 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // False positive.
|
589 |
pub fn add_near_heap_limit_callback(
|
857 |
// not: https://github.com/rust-lang/rust-clippy/issues/3045
|
858 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
859 |
pub fn request_interrupt(
|
525 |
// not: https://github.com/rust-lang/rust-clippy/issues/3045
|
526 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
527 |
pub fn request_interrupt(
|
488 |
// not: https://github.com/rust-lang/rust-clippy/issues/3045
|
489 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
490 |
pub fn request_interrupt(
|
161 |
/// Casts a 3x3 matrix to a quaternion
|
162 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
163 |
pub fn quat_cast(m: *mut SPMat3) -> SPQuat {
|
167 |
/// Casts a quaternion to a 3x3 matrix
|
168 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
169 |
pub fn mat3_cast(q: *mut SPQuat, m: *mut SPMat3) {
|
220 |
/// Rotates matrix `m` `mangle` (degrees|radians) around `axis`, storing the result in `result`
|
221 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
222 |
pub fn mat3_rotate_ptr(m: *mut SPMat3, angle: f64, axis: *mut SPVec3, result: *mut SPMat3) {
|
227 |
/// in `result`
|
228 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
229 |
pub fn mat3_look_at_inverse_ptr(look: *mut SPVec3, up: *mut SPVec3, result: *mut SPMat3) {
|
233 |
/// Calculates the inverse of `m`, storing the result in `result`
|
234 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
235 |
pub fn mat3_inverse_ptr(m: *mut SPMat3, result: *mut SPMat3) {
|
975 |
#[doc(alias = "selinux_check_access")]
|
976 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
977 |
pub fn check_access(
|
721 |
///
|
722 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
723 |
pub fn event_text(event: *mut TSrvEvent) -> Result<String> {
|
33 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
34 |
fn dealloc(&mut self, ptr: *mut u8, layout: Layout) {
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_dual1<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_dual2<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_ring<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_serial1<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_serial2<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_serial3<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_stereo<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
9 |
*/
|
10 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
11 |
pub fn do_wide<const A_FILTER_ACTIVE: bool, const WAVESHAPER_ACTIVE: bool, const B_FILTER_ACTIVE: bool>(
|
104 |
#[no_mangle]
|
105 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
106 |
pub extern "system" fn debug_callback(
|
64 |
#[inline]
|
65 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
66 |
pub fn get_f32(&self, tto: *const tm_the_truth_object_o, property: u32) -> f32 {
|
71 |
#[inline]
|
72 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
73 |
pub fn get_f64(&self, tto: *const tm_the_truth_object_o, property: u32) -> f64 {
|
78 |
#[inline]
|
79 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
80 |
pub fn get_u32(&self, tto: *const tm_the_truth_object_o, property: u32) -> u32 {
|
85 |
#[inline]
|
86 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
87 |
pub fn get_u64(&self, tto: *const tm_the_truth_object_o, property: u32) -> u64 {
|
92 |
#[inline]
|
93 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
94 |
pub fn get_bool(&self, tto: *const tm_the_truth_object_o, property: u32) -> bool {
|
128 |
/// Converts tr_stat into TorrentStats
|
129 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
130 |
impl From<*const transmission_sys::tr_stat> for TorrentStats {
|
1045 |
// It is safe to dereference a pointer that comes from `get_string_utf_chars`.
|
1046 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
1047 |
pub fn release_string_utf_chars(&self, obj: JString, arr: *const c_char) -> Result<()> {
|
19 |
#[inline(always)]
|
20 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
21 |
pub fn new<'s>(
|
1016 |
/// different GCType filters.
|
1017 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // False positive.
|
1018 |
#[inline(always)]
|
1031 |
/// AddGCPrologueCallback function.
|
1032 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // False positive.
|
1033 |
#[inline(always)]
|
1044 |
/// invoked.
|
1045 |
#[allow(clippy::not_unsafe_ptr_arg_deref)] // False positive.
|
1046 |
#[inline(always)]
|
1473 |
// not: https://github.com/rust-lang/rust-clippy/issues/3045
|
1474 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
1475 |
#[inline(always)]
|
610 |
/// To retrieve such a field, GetAlignedPointerFromInternalField must be used.
|
611 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
612 |
#[inline(always)]
|
76 |
/// The pointer must be non-null, and the magic must match
|
77 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
78 |
pub fn new(raw: *mut varnish_sys::vrt_ctx) -> Self {
|
7 |
/// Create a `Vsb` from a C pointer
|
8 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
9 |
pub fn new(raw: *mut varnish_sys::vsb) -> Self {
|
125 |
#[wasm_bindgen]
|
126 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
127 |
#[doc(hidden)]
|
41 |
#[allow(non_snake_case)]
|
42 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
43 |
impl ICoreWebView2EnvironmentOptions_Impl for CoreWebView2EnvironmentOptions {
|
123 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
124 |
#[allow(non_snake_case)]
|
30 |
/// The logger that is active by default. Logs messages to the log crate
|
31 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
32 |
pub extern "C" fn default_logger(
|
250 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
251 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
252 |
fn get_rust_rep(arg:Self::SourceType)->Self{
|
361 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
362 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
363 |
fn get_rust_rep(arg:Self::SourceType)->Self{
|
272 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
273 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
274 |
fn get_rust_rep(ptr:*mut MonoDelegate)->Delegate<Args>{
|
280 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
281 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
282 |
fn get_rust_rep(ptr:*mut MonoDelegate)->Option<Delegate<Args>>{
|
19 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
20 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
21 |
fn get_rust_rep(mono_arg:Self::SourceType)->Self{
|
86 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
87 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
88 |
fn get_rust_rep(src:Self::SourceType)->Self{
|
96 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
97 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
98 |
fn get_rust_rep(src:Self::SourceType)->Self{
|
289 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
290 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
291 |
fn get_rust_rep(arg:Self::SourceType)->Self{
|
304 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
305 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
306 |
fn get_rust_rep(arg:Self::SourceType)->Self{
|
117 |
// unless this function is abused, this argument should come from the mono runtime, so it should be always valid.
|
118 |
#[allow(clippy::not_unsafe_ptr_arg_deref)]
|
119 |
fn get_rust_rep(rarg: Self::SourceType)->Self{
|
1 |
#![allow(non_snake_case)]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
17 |
#![allow(non_camel_case_types, deprecated)]
|
18 |
#![allow(clippy::too_many_arguments, clippy::not_unsafe_ptr_arg_deref, clippy::missing_safety_doc)]
|
17 |
#![allow(non_camel_case_types)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
17 |
#![allow(non_camel_case_types, non_upper_case_globals)]
|
18 |
#![allow(clippy::wildcard_in_or_patterns, clippy::not_unsafe_ptr_arg_deref)]
|
17 |
#![allow(non_camel_case_types)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
19 |
#![allow(
|
20 |
clippy::not_unsafe_ptr_arg_deref,
|
21 |
clippy::wildcard_in_or_patterns,
|
17 |
#![allow(non_camel_case_types, deprecated)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref, clippy::missing_safety_doc)]
|
17 |
#![allow(non_camel_case_types)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
19 |
#![allow(clippy::wildcard_in_or_patterns)]
|
17 |
#![allow(non_camel_case_types)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
17 |
#![allow(non_camel_case_types)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref, clippy::wildcard_in_or_patterns)]
|
17 |
#![allow(non_camel_case_types, deprecated)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref, clippy::wildcard_in_or_patterns)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use std::ffi::{c_void, CString};
|
3 |
//we'd rather have every unsafe block explicit, so disabling warning that function is not unsafe
|
4 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use std::{ffi::c_void, mem::forget};
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use std::{ffi::c_void, mem::forget};
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
#![allow(non_snake_case)]
|
3 |
// TODO: https://github.com/jni-rs/jni-rs/issues/348
|
4 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
22 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
49 |
clippy::must_use_candidate,
|
50 |
clippy::not_unsafe_ptr_arg_deref,
|
51 |
clippy::use_self,
|
5 |
#![forbid(missing_docs)]
|
6 |
#![allow(clippy::not_unsafe_ptr_arg_deref)] // not stable, has false-positive results. so just keep it off for this module.
|
258 |
// because speedy
|
259 |
clippy::not_unsafe_ptr_arg_deref,
|
260 |
)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(non_camel_case_types)]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![no_std]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
3 |
#![allow(clippy::enum_clike_unportable_variant)]
|
21 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(non_upper_case_globals)]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
8 |
)]
|
9 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use error::PlistError;
|
2 |
#![allow(non_camel_case_types)]
|
3 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
4 |
#![cfg_attr(feature = "read_buf", feature(read_buf))]
|
7 |
#![warn(rust_2018_idioms)]
|
8 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
9 |
#![allow(clippy::missing_safety_doc)]
|
1 |
#![cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
5 |
#![cfg_attr(feature = "cargo-clippy", allow(not_unsafe_ptr_arg_deref))]
|
11 |
#![allow(clippy::not_unsafe_ptr_arg_deref, unsafe_code)]
|
11 |
#![allow(clippy::not_unsafe_ptr_arg_deref, unsafe_code)]
|
18 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
19 |
extern crate libc;
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
169 |
#![allow(clippy::too_many_arguments)]
|
170 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
171 |
#![allow(clippy::missing_safety_doc)]
|
5 |
//! Useful when working with sqlite3_value or sqlite3_context.
|
6 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![doc = include_str!("../README.md")]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
3 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
4 |
use std::{
|
5 |
// bug in swc
|
6 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::boxed_local)]
|
2 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use swc_core::{
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
#![feature(box_patterns)]
|
1 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
2 |
use swc_core::{
|
5 |
#![feature(if_let_guard)]
|
6 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
202 |
// it's reading/writing to them that's unsafe
|
203 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
204 |
unsafe { Self::wrap(ptr) }
|
41 |
clippy::needless_update,
|
42 |
clippy::not_unsafe_ptr_arg_deref,
|
43 |
clippy::slow_vector_initialization,
|
14 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|
15 |
use std::os::raw::c_uint;
|
19 |
// See https://github.com/rust-lang/rfcs/pull/2585 for more background.
|
20 |
#![allow(clippy::not_unsafe_ptr_arg_deref)]
|