1
Fork 0

std: deny(unsafe_op_in_unsafe_fn) but allow sites

This provides a list of locations to hunt down issues in.
This commit is contained in:
Jubilee Young 2024-07-14 16:43:50 -07:00
parent f8e4ac0760
commit 4572ed6389
9 changed files with 12 additions and 1 deletions

View file

@ -1,3 +1,5 @@
#![allow(unsafe_op_in_unsafe_fn)]
#[cfg(test)]
mod tests;

View file

@ -9,6 +9,7 @@
//! and those without will return a [`String`].
#![stable(feature = "env", since = "1.0.0")]
#![allow(unsafe_op_in_unsafe_fn)]
#[cfg(test)]
mod tests;

View file

@ -160,6 +160,7 @@
//! [`from_wide`]: crate::os::windows::ffi::OsStringExt::from_wide "os::windows::ffi::OsStringExt::from_wide"
#![stable(feature = "rust1", since = "1.0.0")]
#![allow(unsafe_op_in_unsafe_fn)]
#[unstable(feature = "c_str_module", issue = "112134")]
pub mod c_str;

View file

@ -293,6 +293,7 @@
//! [`Arc`]: crate::sync::Arc
#![stable(feature = "rust1", since = "1.0.0")]
#![allow(unsafe_op_in_unsafe_fn)]
#[cfg(test)]
mod tests;

View file

@ -252,6 +252,7 @@
#![allow(internal_features)]
#![deny(rustc::existing_doc_keyword)]
#![deny(fuzzy_provenance_casts)]
#![deny(unsafe_op_in_unsafe_fn)]
#![allow(rustdoc::redundant_explicit_links)]
// Ensure that std can be linked against panic_abort despite compiled with `-C panic=unwind`
#![deny(ffi_unwind_calls)]
@ -664,7 +665,7 @@ pub mod alloc;
mod panicking;
#[path = "../../backtrace/src/lib.rs"]
#[allow(dead_code, unused_attributes, fuzzy_provenance_casts)]
#[allow(dead_code, unused_attributes, fuzzy_provenance_casts, unsafe_op_in_unsafe_fn)]
mod backtrace_rs;
// Re-export macros defined in core.

View file

@ -2,6 +2,7 @@
#![stable(feature = "os", since = "1.0.0")]
#![allow(missing_docs, nonstandard_style, missing_debug_implementations)]
#![allow(unsafe_op_in_unsafe_fn)]
pub mod raw;

View file

@ -157,6 +157,7 @@
//! [`RwLock`]: crate::sync::RwLock
#![stable(feature = "rust1", since = "1.0.0")]
#![allow(unsafe_op_in_unsafe_fn)]
#[stable(feature = "rust1", since = "1.0.0")]
pub use alloc_crate::sync::{Arc, Weak};

View file

@ -1,3 +1,5 @@
#![allow(unsafe_op_in_unsafe_fn)]
/// The PAL (platform abstraction layer) contains platform-specific abstractions
/// for implementing the features in the other submodules, e.g. UNIX file
/// descriptors.

View file

@ -16,6 +16,7 @@
#![allow(missing_docs)]
#![allow(missing_debug_implementations)]
#![allow(unsafe_op_in_unsafe_fn)]
#[cfg(test)]
mod tests;