266 |
#[test]
|
267 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
268 |
fn check_reference_size_ptr() {
|
274 |
#[test]
|
275 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
276 |
fn check_reference_size_val() {
|
220 |
#[test]
|
221 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
222 |
fn check_reference_size_ptr() {
|
228 |
#[test]
|
229 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
230 |
fn check_reference_size_val() {
|
317 |
#[test]
|
318 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
319 |
fn check_reference_size_ptr() {
|
325 |
#[test]
|
326 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
327 |
fn check_reference_size_ptr_normalized() {
|
333 |
#[test]
|
334 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
335 |
fn check_reference_size_val() {
|
343 |
#[test]
|
344 |
#[allow(clippy::forget_ref, clippy::transmute_ptr_to_ptr)]
|
345 |
fn check_reference_size_val_normalized() {
|
15 |
impl Utf8Lossy {
|
16 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
17 |
pub fn from_bytes(bytes: &[u8]) -> &Self {
|
11 |
impl Utf8Lossy {
|
12 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
13 |
pub fn from_bytes(bytes: &[u8]) -> &Self {
|
32 |
clippy::range_plus_one,
|
33 |
clippy::transmute_ptr_to_ptr,
|
34 |
clippy::reversed_empty_ranges
|
10 |
clippy::range_plus_one,
|
11 |
clippy::transmute_ptr_to_ptr
|
12 |
)]
|
11 |
clippy::range_plus_one,
|
12 |
clippy::transmute_ptr_to_ptr
|
13 |
)]
|
24 |
impl OsStrExt3 for OsStr {
|
25 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
26 |
fn from_bytes(b: &[u8]) -> &Self {
|
326 |
// TODO Figure out a better way to allow the System Program to set the account owner
|
327 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
328 |
#[allow(mutable_transmutes)]
|
10 |
#[inline]
|
11 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
12 |
pub unsafe fn as_ref(&self) -> &T {
|
15 |
#[inline]
|
16 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
17 |
pub unsafe fn as_mut(&mut self) -> &mut T {
|
24 |
#[allow(single_use_lifetimes)]
|
25 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
26 |
unsafe fn remove_future_lifetime<'a, T>(ptr: *mut (dyn Future<Output = T> + 'a))
|
27 |
#[allow(single_use_lifetimes)]
|
28 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
29 |
unsafe fn remove_future_lifetime<'a, T>(
|
351 |
// TODO Figure out a better way to allow the System Program to set the account owner
|
352 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
353 |
#[allow(mutable_transmutes)]
|
304 |
/// context.
|
305 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
306 |
pub fn block_on<F: Future>(&self, f: F) -> F::Output {
|
981 |
// NOTE(safety): we're just changing a ZST tag
|
982 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
983 |
let spec: &PathSpec<Params<P>> = unsafe { mem::transmute(spec) };
|
100 |
{
|
101 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
102 |
fn set_inner(mut self: Pin<&mut Self>, list_option: Option<ListOptions>) {
|
146 |
pub fn try_as_str(&self) -> Result<&str, ConversionError> {
|
147 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
148 |
let s: &[u8] = unsafe { mem::transmute(self.as_slice()) };
|
158 |
pub unsafe fn as_str_unchecked(&self) -> &str {
|
159 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
160 |
let s: &[u8] = mem::transmute(self.as_slice());
|
64 |
unsafe {
|
65 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
66 |
mem::transmute::<&str, &'a str>(any.cast_ref_scalar_string())
|
395 |
}
|
396 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
397 |
let this: &Arena<T> = unsafe {std::mem::transmute(self)};
|
513 |
// we have to transmute since we don't know if it's a u64 or u128
|
514 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
515 |
let lg_ptr: *const u128 = transmute(ptr.add(byte_idx_st));
|
78 |
#[allow(mutable_transmutes)]
|
79 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
80 |
std::mem::transmute(&*lb)
|
83 |
#[allow(mutable_transmutes)]
|
84 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
85 |
std::mem::transmute(&mb.common)
|
1023 |
&name,
|
1024 |
#[allow(mutable_transmutes, clippy::transmute_ptr_to_ptr)]
|
1025 |
unsafe {
|
203 |
#[allow(mutable_transmutes)]
|
204 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
205 |
pipeline.run(unsafe { std::mem::transmute(universe) });
|
34 |
{
|
35 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
36 |
(system.system)(unsafe { std::mem::transmute(universe) })
|
47 |
if item.is_lock_on_single_thread() {
|
48 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
49 |
Self::run_node(item, unsafe { std::mem::transmute(universe) });
|
59 |
if item.is_lock_on_single_thread() {
|
60 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
61 |
Self::run_node(item, unsafe { std::mem::transmute(universe) });
|
146 |
#[allow(mutable_transmutes)]
|
147 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
148 |
system(unsafe { std::mem::transmute(universe) });
|
317 |
#[allow(mutable_transmutes)]
|
318 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
319 |
let universe = unsafe { std::mem::transmute(&mut *universe) };
|
772 |
#[allow(mutable_transmutes)]
|
773 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
774 |
{
|
59 |
// wrapper is safe because they both have the same data address and metadata
|
60 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
61 |
unsafe {
|
59 |
// wrapper is safe because they both have the same data address and metadata
|
60 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
61 |
unsafe {
|
102 |
pub fn empty() -> &'static Self {
|
103 |
#[allow(clippy::transmute_ptr_to_ptr)] // alternative causes ICE
|
104 |
unsafe { mem::transmute::<&[T], _>(&[]) }
|
577 |
pub fn as_chain(&self) -> &Chain<T> {
|
578 |
#[allow(clippy::transmute_ptr_to_ptr)] // alternative causes ICE
|
579 |
unsafe { mem::transmute(self.0.as_slice()) }
|
62 |
// Required for lifetime erasure
|
63 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
64 |
&*mem::transmute::<_, *const QueryClient<'scope>>(
|
24 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
25 |
unsafe fn remove_future_lifetime<'a, T>(ptr: *mut (dyn Future<Output = T> + 'a))
|
338 |
// TODO Figure out a better way to allow the System Program to set the account owner
|
339 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
340 |
#[allow(mutable_transmutes)]
|
202 |
#[allow(unsafe_code)]
|
203 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
204 |
let buf = unsafe { std::mem::transmute(buf) };
|
194 |
#[doc(hidden)]
|
195 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
196 |
#[inline]
|
118 |
let callback: *mut (CallOnce + Send) = Box::into_raw( callback );
|
119 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
120 |
let callback: *mut (CallOnce + Send + 'static) = unsafe { mem::transmute( callback ) };
|
57 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
58 |
pub fn allocate_with_finalization<T: Scan + Finalize>(v: T) -> (Self, *const T) {
|
85 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
86 |
fn raw_allocate<'a, T: Scan + 'a>(v: T) -> (*const dyn Scan, *const T) {
|
23 |
mutable_transmutes,
|
24 |
clippy::transmute_ptr_to_ptr,
|
25 |
clippy::too_many_lines,
|
44 |
mutable_transmutes,
|
45 |
clippy::transmute_ptr_to_ptr,
|
46 |
clippy::cast_ptr_alignment,
|
16 |
mutable_transmutes,
|
17 |
clippy::transmute_ptr_to_ptr,
|
18 |
clippy::cast_ptr_alignment,
|
22 |
mutable_transmutes,
|
23 |
clippy::transmute_ptr_to_ptr,
|
24 |
clippy::cast_ptr_alignment,
|
338 |
// TODO Figure out a better way to allow the System Program to set the account owner
|
339 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
340 |
#[allow(mutable_transmutes)]
|
326 |
// TODO Figure out a better way to allow the System Program to set the account owner
|
327 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
328 |
#[allow(mutable_transmutes)]
|
792 |
// false positive: https://github.com/rust-lang/rust-clippy/issues/2906
|
793 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
794 |
mem::transmute(p)
|
788 |
// false positive: https://github.com/rust-lang/rust-clippy/issues/2906
|
789 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
790 |
mem::transmute(p)
|
179 |
// false positive: https://github.com/rust-lang/rust-clippy/issues/2906
|
180 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
181 |
mem::transmute(p)
|
305 |
// ALLOW: https://github.com/tremor-rs/tremor-runtime/issues/1033
|
306 |
#[allow(mutable_transmutes, clippy::transmute_ptr_to_ptr)]
|
307 |
fn assign_nested<'run, 'event>(
|
855 |
// ALLOW: https://github.com/tremor-rs/tremor-runtime/issues/1035
|
856 |
#[allow(mutable_transmutes, clippy::transmute_ptr_to_ptr)]
|
857 |
// ALLOW: https://github.com/tremor-rs/tremor-runtime/issues/1035
|
1503 |
// ALLOW: https://github.com/tremor-rs/tremor-runtime/issues/1029
|
1504 |
#[allow(mutable_transmutes, clippy::transmute_ptr_to_ptr)]
|
1505 |
fn set_local_shadow<'local, 'event, Expr>(
|
156 |
let offset = cref.offset as usize;
|
157 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
158 |
transmute::<&[LitIdx], &Clause>(slice::from_raw_parts(
|
165 |
let offset = cref.offset as usize;
|
166 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
167 |
transmute::<&mut [LitIdx], &mut Clause>(slice::from_raw_parts_mut(
|
41 |
// Lit is a repr(transparent) wrapper of LitIdx
|
42 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
43 |
transmute::<&[Lit], &[LitIdx]>(lits)
|
64 |
// Lit is a repr(transparent) wrapper of LitIdx
|
65 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
66 |
transmute::<&[LitIdx], &[Lit]>(&self.inline[..self.length as usize])
|
27 |
unsafe {
|
28 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
29 |
std::mem::transmute::<&mut T, &Self>(mut_ref)
|
739 |
// type being `Array` so this is safe.
|
740 |
#[allow(unsafe_code, clippy::transmute_ptr_to_ptr)]
|
741 |
unsafe {
|
101 |
/// This impl requires enabling the optional `yoke` Cargo feature of the `zerovec` crate
|
102 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
103 |
unsafe impl<'a, K, V> Yokeable<'a> for ZeroMap<'static, K, V>
|
147 |
/// This impl requires enabling the optional `yoke` Cargo feature of the `zerovec` crate
|
148 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
149 |
unsafe impl<'a, K, V> Yokeable<'a> for ZeroMapBorrowed<'static, K, V>
|
193 |
/// This impl requires enabling the optional `yoke` Cargo feature of the `zerovec` crate
|
194 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
195 |
unsafe impl<'a, K0, K1, V> Yokeable<'a> for ZeroMap2d<'static, K0, K1, V>
|
241 |
/// This impl requires enabling the optional `yoke` Cargo feature of the `zerovec` crate
|
242 |
#[allow(clippy::transmute_ptr_to_ptr)]
|
243 |
unsafe impl<'a, K0, K1, V> Yokeable<'a> for ZeroMap2dBorrowed<'static, K0, K1, V>
|
315 |
clippy::needless_doctest_main,
|
316 |
clippy::transmute_ptr_to_ptr,
|
317 |
clippy::unnecessary_wraps,
|
45 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
46 |
#![cfg_attr(all(not(test), not(feature = "std")), no_std)]
|
19 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
3 |
#![allow(clippy::transmute_ptr_to_ref)]
|
4 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
5 |
use std::ffi::{CStr, CString};
|
1 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
66 |
#![warn(missing_docs)]
|
67 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
68 |
#![allow(clippy::ptr_offset_with_cast)]
|
120 |
// Not great. See issue #52.
|
121 |
clippy::transmute_ptr_to_ptr,
|
122 |
// These are output from the build macros; if we could get output integers to include
|
85 |
#![allow(clippy::useless_transmute)]
|
86 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
87 |
#![allow(clippy::trivially_copy_pass_by_ref)]
|
7 |
#![allow(clippy::question_mark)]
|
8 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
9 |
#![allow(clippy::type_complexity)]
|
55 |
clippy::unreadable_literal,
|
56 |
clippy::transmute_ptr_to_ptr,
|
57 |
clippy::redundant_static_lifetimes,
|
59 |
clippy::unreadable_literal,
|
60 |
clippy::transmute_ptr_to_ptr,
|
61 |
clippy::redundant_static_lifetimes,
|
140 |
// Avoid complaints on im_str! calls
|
141 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
23 |
#![allow(
|
24 |
clippy::transmute_ptr_to_ptr,
|
25 |
clippy::missing_safety_doc,
|
1 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
2 |
#![allow(clippy::too_many_arguments)]
|
3 |
#![allow(
|
4 |
clippy::transmute_ptr_to_ptr, // Introduced by com-rs
|
5 |
clippy::too_many_arguments, // We're wrapping and API outside of our control
|
13 |
#![allow(clippy::too_many_arguments)]
|
14 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
15 |
#![allow(clippy::trivially_copy_pass_by_ref)]
|
61 |
// reading the code.
|
62 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
63 |
// Disabling this particular clippy warning requires more significant
|
30 |
#![warn(missing_docs, rust_2018_idioms)]
|
31 |
#![allow(clippy::needless_range_loop, clippy::transmute_ptr_to_ptr)]
|
9 |
#![allow(clippy::needless_pass_by_value)]
|
10 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
11 |
#![allow(clippy::too_many_arguments)]
|
16 |
clippy::redundant_closure_for_method_calls,
|
17 |
clippy::transmute_ptr_to_ptr
|
18 |
)]
|
1 |
#![cfg_attr(feature = "cargo-clippy", allow(transmute_ptr_to_ptr))] // TODO later
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(transmute_ptr_to_ref))] // TODO later
|
1 |
#![cfg_attr(feature = "cargo-clippy", allow(transmute_ptr_to_ptr))] // TODO later
|
2 |
#![cfg_attr(feature = "cargo-clippy", allow(transmute_ptr_to_ref))] // TODO later
|
68 |
// Clippy is wrong.
|
69 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
70 |
// Worse readability sometimes.
|
1 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
2 |
#![allow(clippy::transmute_ptr_to_ref)]
|
1 |
#![doc = r" Automatically generated code; do not edit!"]
|
2 |
#![allow(clippy::wrong_self_convention, clippy::transmute_ptr_to_ptr)]
|
3 |
use crate::*;
|
3 |
// deref_addrof false positive: https://github.com/rust-lang/rust-clippy/issues/8247
|
4 |
#![allow(clippy::transmute_ptr_to_ptr, clippy::deref_addrof)]
|
5 |
use std::os::raw::c_char;
|
17 |
#![allow(clippy::approx_constant)]
|
18 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
19 |
#![allow(clippy::new_without_default_derive)]
|
170 |
// This is a silly lint; I always turbofish the transmute so it's fine
|
171 |
clippy::transmute_ptr_to_ptr,
|
4 |
#![cfg_attr(docsrs, feature(doc_cfg))]
|
5 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
6 |
// FIXME - the docs in this crate a *very* minimal, and need to be expanded upon
|
7 |
clippy::missing_safety_doc,
|
8 |
clippy::transmute_ptr_to_ptr,
|
9 |
clippy::unused_unit,
|
7 |
clippy::missing_safety_doc,
|
8 |
clippy::transmute_ptr_to_ptr,
|
9 |
clippy::unused_unit,
|
11 |
clippy::unwrap_in_result,
|
12 |
clippy::transmute_ptr_to_ptr,
|
13 |
clippy::shadow_reuse,
|
3 |
#![allow(unused_imports)]
|
4 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
5 |
#![cfg_attr(docs_rs, feature(doc_cfg))]
|
320 |
clippy::return_self_not_must_use,
|
321 |
clippy::transmute_ptr_to_ptr,
|
322 |
clippy::unnecessary_wraps,
|
323 |
clippy::needless_doctest_main,
|
324 |
clippy::transmute_ptr_to_ptr,
|
325 |
clippy::unnecessary_wraps,
|
315 |
clippy::needless_doctest_main,
|
316 |
clippy::transmute_ptr_to_ptr,
|
317 |
clippy::unnecessary_wraps,
|
3 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
4 |
#![deny(warnings)]
|
5 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
6 |
#![deny(warnings)]
|
3 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
4 |
#![deny(warnings)]
|
8 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
9 |
#![deny(warnings)]
|
10 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
11 |
#![deny(warnings)]
|
10 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
11 |
#![deny(warnings)]
|
1 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
2 |
use interchange::Responder;
|
9 |
// https://github.com/rust-lang/rust-clippy/issues/6372
|
10 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
1 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
6 |
// than using pointer casts
|
7 |
#![allow(clippy::transmute_ptr_to_ptr)]
|
6 |
// than using pointer casts
|
7 |
#![allow(clippy::transmute_ptr_to_ptr)]
|