[INFO] fetching crate i-slint-core 1.6.0... [INFO] checking i-slint-core-1.6.0 against master#506512391b1a75ae450d36c9420978402a91abcc for pr-125384 [INFO] extracting crate i-slint-core 1.6.0 into /workspace/builds/worker-3-tc1/source [INFO] validating manifest of crates.io crate i-slint-core 1.6.0 on toolchain 506512391b1a75ae450d36c9420978402a91abcc [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate i-slint-core 1.6.0 [INFO] finished tweaking crates.io crate i-slint-core 1.6.0 [INFO] tweaked toml for crates.io crate i-slint-core 1.6.0 written to /workspace/builds/worker-3-tc1/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 161 packages to latest compatible versions [INFO] [stderr] Adding addr2line v0.21.0 (latest: v0.23.0) [INFO] [stderr] Adding bitflags v1.3.2 (latest: v2.5.0) [INFO] [stderr] Adding convert_case v0.4.0 (latest: v0.6.0) [INFO] [stderr] Adding fontdb v0.16.2 (latest: v0.17.0) [INFO] [stderr] Adding fontdue v0.8.0 (latest: v0.9.0) [INFO] [stderr] Adding gimli v0.28.1 (latest: v0.30.0) [INFO] [stderr] Adding heck v0.4.1 (latest: v0.5.0) [INFO] [stderr] Adding image v0.24.9 (latest: v0.25.1) [INFO] [stderr] Adding malloc_buf v0.0.6 (latest: v1.0.0) [INFO] [stderr] Adding object v0.32.2 (latest: v0.36.0) [INFO] [stderr] Adding roxmltree v0.19.0 (latest: v0.20.0) [INFO] [stderr] Adding rustybuzz v0.13.0 (latest: v0.14.0) [INFO] [stderr] Adding strict-num v0.1.1 (latest: v0.2.0) [INFO] [stderr] Adding syn v1.0.109 (latest: v2.0.66) [INFO] [stderr] Adding ttf-parser v0.20.0 (latest: v0.21.1) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded vtable v0.2.0 [INFO] [stderr] Downloaded critical-section v1.1.2 [INFO] [stderr] Downloaded unicode-linebreak v0.1.5 [INFO] [stderr] Downloaded unicode-script v0.5.6 [INFO] [stderr] Downloaded const-field-offset-macro v0.1.5 [INFO] [stderr] Downloaded lyon_algorithms v1.0.4 [INFO] [stderr] Downloaded xmlwriter v0.1.0 [INFO] [stderr] Downloaded i-slint-core-macros v1.6.0 [INFO] [stderr] Downloaded svgtypes v0.15.1 [INFO] [stderr] Downloaded scoped-tls-hkt v0.1.4 [INFO] [stderr] Downloaded temp-dir v0.1.13 [INFO] [stderr] Downloaded unicode-vo v0.1.0 [INFO] [stderr] Downloaded gettext-rs v0.7.0 [INFO] [stderr] Downloaded locale_config v0.3.0 [INFO] [stderr] Downloaded lyon_geom v1.0.5 [INFO] [stderr] Downloaded siphasher v1.0.1 [INFO] [stderr] Downloaded lyon_extra v1.0.2 [INFO] [stderr] Downloaded derive_utils v0.14.1 [INFO] [stderr] Downloaded data-url v0.3.1 [INFO] [stderr] Downloaded fontdue v0.8.0 [INFO] [stderr] Downloaded rustybuzz v0.13.0 [INFO] [stderr] Downloaded jpeg-decoder v0.3.1 [INFO] [stderr] Downloaded i-slint-common v1.6.0 [INFO] [stderr] Downloaded fontdb v0.16.2 [INFO] [stderr] Downloaded usvg v0.41.0 [INFO] [stderr] Downloaded ttf-parser v0.20.0 [INFO] [stderr] Downloaded fontconfig-parser v0.5.6 [INFO] [stderr] Downloaded roxmltree v0.19.0 [INFO] [stderr] Downloaded auto_enums v0.8.5 [INFO] [stderr] Downloaded clru v0.6.2 [INFO] [stderr] Downloaded pin-weak v1.1.0 [INFO] [stderr] Downloaded imagesize v0.12.0 [INFO] [stderr] Downloaded pico-args v0.5.0 [INFO] [stderr] Downloaded simplecss v0.2.1 [INFO] [stderr] Downloaded kurbo v0.11.0 [INFO] [stderr] Downloaded unicode-bidi-mirroring v0.2.0 [INFO] [stderr] Downloaded lyon_path v1.0.5 [INFO] [stderr] Downloaded resvg v0.41.0 [INFO] [stderr] Downloaded unicode-ccc v0.2.0 [INFO] [stderr] Downloaded integer-sqrt v0.1.5 [INFO] [stderr] Downloaded euclid v0.22.10 [INFO] [stderr] Downloaded rgb v0.8.37 [INFO] [stderr] Downloaded const-field-offset v0.1.5 [INFO] [stderr] Downloaded vtable-macro v0.2.0 [INFO] [stderr] Downloaded web-time v1.1.0 [INFO] [stderr] Downloaded gettext-sys v0.21.3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:beeedbb442662e57d416641ecc3200b38e573c25b057896194468d05594dd835" "/opt/rustwide/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] e8e2845a6c92b9fcbe1fdd91e6e26f60c9fc53d14573453bf28418208987cbfe [INFO] running `Command { std: "docker" "start" "-a" "e8e2845a6c92b9fcbe1fdd91e6e26f60c9fc53d14573453bf28418208987cbfe", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "e8e2845a6c92b9fcbe1fdd91e6e26f60c9fc53d14573453bf28418208987cbfe", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e8e2845a6c92b9fcbe1fdd91e6e26f60c9fc53d14573453bf28418208987cbfe", kill_on_drop: false }` [INFO] [stdout] e8e2845a6c92b9fcbe1fdd91e6e26f60c9fc53d14573453bf28418208987cbfe [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:beeedbb442662e57d416641ecc3200b38e573c25b057896194468d05594dd835" "/opt/rustwide/cargo-home/bin/cargo" "+506512391b1a75ae450d36c9420978402a91abcc" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 254843f090e90fe286f0f2f6e196ef2cfacfb8768e4d8afb6192eb86d24c0175 [INFO] running `Command { std: "docker" "start" "-a" "254843f090e90fe286f0f2f6e196ef2cfacfb8768e4d8afb6192eb86d24c0175", kill_on_drop: false }` [INFO] [stderr] Compiling libm v0.2.8 [INFO] [stderr] Checking arrayvec v0.7.4 [INFO] [stderr] Checking simd-adler32 v0.3.7 [INFO] [stderr] Compiling semver v1.0.23 [INFO] [stderr] Checking bytemuck v1.16.0 [INFO] [stderr] Checking roxmltree v0.19.0 [INFO] [stderr] Checking ttf-parser v0.20.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling slotmap v1.0.7 [INFO] [stderr] Compiling memoffset v0.9.1 [INFO] [stderr] Checking float-cmp v0.9.0 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling syn v2.0.66 [INFO] [stderr] Compiling rustversion v1.0.17 [INFO] [stderr] Compiling portable-atomic v1.6.0 [INFO] [stderr] Checking strict-num v0.1.1 [INFO] [stderr] Checking miniz_oxide v0.7.3 [INFO] [stderr] Checking fdeflate v0.3.4 [INFO] [stderr] Checking kurbo v0.11.0 [INFO] [stderr] Checking siphasher v1.0.1 [INFO] [stderr] Checking tiny-skia-path v0.11.4 [INFO] [stderr] Checking unicode-bidi-mirroring v0.2.0 [INFO] [stderr] Checking unicode-properties v0.1.1 [INFO] [stderr] Checking unicode-script v0.5.6 [INFO] [stderr] Checking critical-section v1.1.2 [INFO] [stderr] Checking unicode-ccc v0.2.0 [INFO] [stderr] Compiling slab v0.4.9 [INFO] [stderr] Checking simplecss v0.2.1 [INFO] [stderr] Checking fontconfig-parser v0.5.6 [INFO] [stderr] Compiling rustc_version v0.4.0 [INFO] [stderr] Checking base64 v0.22.1 [INFO] [stderr] Checking unicode-bidi v0.3.15 [INFO] [stderr] Checking pico-args v0.5.0 [INFO] [stderr] Compiling convert_case v0.4.0 [INFO] [stderr] Checking flate2 v1.0.30 [INFO] [stderr] Checking data-url v0.3.1 [INFO] [stderr] Checking imagesize v0.12.0 [INFO] [stderr] Checking unicode-vo v0.1.0 [INFO] [stderr] Compiling serde v1.0.203 [INFO] [stderr] Compiling field-offset v0.3.6 [INFO] [stderr] Compiling heck v0.4.1 [INFO] [stderr] Checking xmlwriter v0.1.0 [INFO] [stderr] Checking rgb v0.8.37 [INFO] [stderr] Checking color_quant v1.1.0 [INFO] [stderr] Checking jpeg-decoder v0.3.1 [INFO] [stderr] Checking stable_deref_trait v1.2.0 [INFO] [stderr] Checking png v0.17.13 [INFO] [stderr] Compiling i-slint-core v1.6.0 (/opt/rustwide/workdir) [INFO] [stderr] Checking unicode-linebreak v0.1.5 [INFO] [stderr] Checking pin-weak v1.1.0 [INFO] [stderr] Checking svgtypes v0.15.1 [INFO] [stderr] Checking scoped-tls-hkt v0.1.4 [INFO] [stderr] Checking clru v0.6.2 [INFO] [stderr] Checking unicode-segmentation v1.11.0 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Checking tokio v1.37.0 [INFO] [stderr] Checking euclid v0.22.10 [INFO] [stderr] Checking integer-sqrt v0.1.5 [INFO] [stderr] Checking tiny-skia v0.11.4 [INFO] [stderr] Checking image v0.24.9 [INFO] [stderr] Checking fontdb v0.16.2 [INFO] [stderr] Checking rustybuzz v0.13.0 [INFO] [stderr] Checking lyon_geom v1.0.5 [INFO] [stderr] Checking lyon_path v1.0.5 [INFO] [stderr] Compiling derive_more v0.99.17 [INFO] [stderr] Checking lyon_algorithms v1.0.4 [INFO] [stderr] Compiling derive_utils v0.14.1 [INFO] [stderr] Checking serde_json v1.0.117 [INFO] [stderr] Checking usvg v0.41.0 [INFO] [stderr] Compiling const-field-offset-macro v0.1.5 [INFO] [stderr] Compiling thiserror-impl v1.0.61 [INFO] [stderr] Compiling pin-project-internal v1.1.5 [INFO] [stderr] Compiling strum_macros v0.26.2 [INFO] [stderr] Compiling vtable-macro v0.2.0 [INFO] [stderr] Compiling auto_enums v0.8.5 [INFO] [stderr] Compiling i-slint-core-macros v1.6.0 [INFO] [stderr] Checking const-field-offset v0.1.5 [INFO] [stderr] Checking i-slint-common v1.6.0 [INFO] [stderr] Checking vtable v0.2.0 [INFO] [stderr] Checking pin-project v1.1.5 [INFO] [stderr] Checking thiserror v1.0.61 [INFO] [stderr] Checking lyon_extra v1.0.2 [INFO] [stderr] Checking resvg v0.41.0 [INFO] [stderr] Checking strum v0.26.2 [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 6.83s [INFO] running `Command { std: "docker" "inspect" "254843f090e90fe286f0f2f6e196ef2cfacfb8768e4d8afb6192eb86d24c0175", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "254843f090e90fe286f0f2f6e196ef2cfacfb8768e4d8afb6192eb86d24c0175", kill_on_drop: false }` [INFO] [stdout] 254843f090e90fe286f0f2f6e196ef2cfacfb8768e4d8afb6192eb86d24c0175 [INFO] checking i-slint-core-1.6.0 against try#dae34b759e282c069aa28752564694effd121a63 for pr-125384 [INFO] extracting crate i-slint-core 1.6.0 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate i-slint-core 1.6.0 on toolchain dae34b759e282c069aa28752564694effd121a63 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate i-slint-core 1.6.0 [INFO] finished tweaking crates.io crate i-slint-core 1.6.0 [INFO] tweaked toml for crates.io crate i-slint-core 1.6.0 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 161 packages to latest compatible versions [INFO] [stderr] Adding addr2line v0.21.0 (latest: v0.23.0) [INFO] [stderr] Adding bitflags v1.3.2 (latest: v2.5.0) [INFO] [stderr] Adding convert_case v0.4.0 (latest: v0.6.0) [INFO] [stderr] Adding fontdb v0.16.2 (latest: v0.17.0) [INFO] [stderr] Adding fontdue v0.8.0 (latest: v0.9.0) [INFO] [stderr] Adding gimli v0.28.1 (latest: v0.30.0) [INFO] [stderr] Adding heck v0.4.1 (latest: v0.5.0) [INFO] [stderr] Adding image v0.24.9 (latest: v0.25.1) [INFO] [stderr] Adding malloc_buf v0.0.6 (latest: v1.0.0) [INFO] [stderr] Adding object v0.32.2 (latest: v0.36.0) [INFO] [stderr] Adding roxmltree v0.19.0 (latest: v0.20.0) [INFO] [stderr] Adding rustybuzz v0.13.0 (latest: v0.14.0) [INFO] [stderr] Adding strict-num v0.1.1 (latest: v0.2.0) [INFO] [stderr] Adding syn v1.0.109 (latest: v2.0.66) [INFO] [stderr] Adding ttf-parser v0.20.0 (latest: v0.21.1) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:beeedbb442662e57d416641ecc3200b38e573c25b057896194468d05594dd835" "/opt/rustwide/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] db05db58f0f9114704011f9a50128fea4f3a46f81f36d737b942a2c8550c101f [INFO] running `Command { std: "docker" "start" "-a" "db05db58f0f9114704011f9a50128fea4f3a46f81f36d737b942a2c8550c101f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "db05db58f0f9114704011f9a50128fea4f3a46f81f36d737b942a2c8550c101f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "db05db58f0f9114704011f9a50128fea4f3a46f81f36d737b942a2c8550c101f", kill_on_drop: false }` [INFO] [stdout] db05db58f0f9114704011f9a50128fea4f3a46f81f36d737b942a2c8550c101f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:beeedbb442662e57d416641ecc3200b38e573c25b057896194468d05594dd835" "/opt/rustwide/cargo-home/bin/cargo" "+dae34b759e282c069aa28752564694effd121a63" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] c64da168601b649b554ac03ed8018a2342c85d13e6f67f7cb23df033b4231778 [INFO] running `Command { std: "docker" "start" "-a" "c64da168601b649b554ac03ed8018a2342c85d13e6f67f7cb23df033b4231778", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (14 fixes) [INFO] [stderr] Compiling libm v0.2.8 [INFO] [stderr] Checking arrayvec v0.7.4 [INFO] [stderr] Compiling semver v1.0.23 [INFO] [stderr] Checking simd-adler32 v0.3.7 [INFO] [stderr] Checking adler v1.0.2 [INFO] [stderr] Checking bytemuck v1.16.0 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking tinyvec_macros v0.1.1 [INFO] [stderr] Checking ttf-parser v0.20.0 [INFO] [stderr] Checking float-cmp v0.9.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking crc32fast v1.4.2 [INFO] [stderr] Compiling slotmap v1.0.7 [INFO] [stderr] Compiling memoffset v0.9.1 [INFO] [stderr] Compiling syn v2.0.66 [INFO] [stderr] Checking roxmltree v0.19.0 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Checking tinyvec v1.6.0 [INFO] [stderr] Checking strict-num v0.1.1 [INFO] [stderr] Checking miniz_oxide v0.7.3 [INFO] [stderr] Checking fdeflate v0.3.4 [INFO] [stderr] Compiling portable-atomic v1.6.0 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling rustversion v1.0.17 [INFO] [stderr] Checking unicode-script v0.5.6 [INFO] [stderr] Checking tiny-skia-path v0.11.4 [INFO] [stderr] Checking kurbo v0.11.0 [INFO] [stderr] Checking siphasher v1.0.1 [INFO] [stderr] Checking unicode-ccc v0.2.0 [INFO] [stderr] Checking unicode-bidi-mirroring v0.2.0 [INFO] [stderr] Compiling rustc_version v0.4.0 [INFO] [stderr] Checking fontconfig-parser v0.5.6 [INFO] [stderr] Checking unicode-properties v0.1.1 [INFO] [stderr] Checking critical-section v1.1.2 [INFO] [stderr] Checking simplecss v0.2.1 [INFO] [stderr] Compiling slab v0.4.9 [INFO] [stderr] Checking imagesize v0.12.0 [INFO] [stderr] Checking flate2 v1.0.30 [INFO] [stderr] Compiling heck v0.4.1 [INFO] [stderr] Checking pico-args v0.5.0 [INFO] [stderr] Checking base64 v0.22.1 [INFO] [stderr] Checking unicode-bidi v0.3.15 [INFO] [stderr] Checking unicode-vo v0.1.0 [INFO] [stderr] Compiling field-offset v0.3.6 [INFO] [stderr] Compiling serde v1.0.203 [INFO] [stderr] Checking data-url v0.3.1 [INFO] [stderr] Compiling convert_case v0.4.0 [INFO] [stderr] Checking xmlwriter v0.1.0 [INFO] [stderr] Checking png v0.17.13 [INFO] [stderr] Checking rgb v0.8.37 [INFO] [stderr] Compiling i-slint-core v1.6.0 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Checking stable_deref_trait v1.2.0 [INFO] [stderr] Checking svgtypes v0.15.1 [INFO] [stderr] Checking byteorder v1.5.0 [INFO] [stderr] Compiling serde_json v1.0.117 [INFO] [stderr] Checking jpeg-decoder v0.3.1 [INFO] [stderr] Checking color_quant v1.1.0 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Checking num_cpus v1.16.0 [INFO] [stderr] Checking scoped-tls-hkt v0.1.4 [INFO] [stderr] Checking clru v0.6.2 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking unicode-linebreak v0.1.5 [INFO] [stderr] Checking ryu v1.0.18 [INFO] [stderr] Checking pin-weak v1.1.0 [INFO] [stderr] Checking unicode-segmentation v1.11.0 [INFO] [stderr] Checking tokio v1.37.0 [INFO] [stderr] Checking euclid v0.22.10 [INFO] [stderr] Checking integer-sqrt v0.1.5 [INFO] [stderr] Checking tiny-skia v0.11.4 [INFO] [stderr] Checking image v0.24.9 [INFO] [stderr] Checking fontdb v0.16.2 [INFO] [stderr] Checking rustybuzz v0.13.0 [INFO] [stderr] Checking lyon_geom v1.0.5 [INFO] [stderr] Checking lyon_path v1.0.5 [INFO] [stderr] Checking lyon_algorithms v1.0.4 [INFO] [stderr] Compiling derive_more v0.99.17 [INFO] [stderr] Compiling derive_utils v0.14.1 [INFO] [stderr] Checking usvg v0.41.0 [INFO] [stderr] Compiling const-field-offset-macro v0.1.5 [INFO] [stderr] Compiling thiserror-impl v1.0.61 [INFO] [stderr] Compiling vtable-macro v0.2.0 [INFO] [stderr] Compiling strum_macros v0.26.2 [INFO] [stderr] Compiling pin-project-internal v1.1.5 [INFO] [stderr] Compiling i-slint-core-macros v1.6.0 [INFO] [stderr] Compiling auto_enums v0.8.5 [INFO] [stderr] Checking const-field-offset v0.1.5 [INFO] [stderr] Checking i-slint-common v1.6.0 [INFO] [stderr] Checking vtable v0.2.0 [INFO] [stderr] Checking thiserror v1.0.61 [INFO] [stderr] Checking lyon_extra v1.0.2 [INFO] [stderr] Checking pin-project v1.1.5 [INFO] [stderr] Checking resvg v0.41.0 [INFO] [stderr] Checking strum v0.26.2 [INFO] [stderr] Migrating lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `i_slint_core` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * api.rs [INFO] [stderr] * component_factory.rs [INFO] [stderr] * graphics/image.rs [INFO] [stderr] * input.rs [INFO] [stderr] * item_focus.rs [INFO] [stderr] * item_rendering.rs [INFO] [stderr] * item_tree.rs [INFO] [stderr] * items.rs [INFO] [stderr] * items/component_container.rs [INFO] [stderr] * items/image.rs [INFO] [stderr] * lib.rs [INFO] [stderr] * model.rs [INFO] [stderr] * renderer.rs [INFO] [stderr] * window.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error: expected item after attributes [INFO] [stderr] --> graphics/image.rs:22:1 [INFO] [stderr] | [INFO] [stderr] 22 | #[allow(missing_docs)] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error: expected item after doc comment [INFO] [stderr] --> item_tree.rs:41:1 [INFO] [stderr] | [INFO] [stderr] 41 | /// A ItemTree is representing an unit that is allocated together [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this doc comment doesn't document anything [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeVTable` [INFO] [stderr] --> api.rs:13:5 [INFO] [stderr] | [INFO] [stderr] 13 | use crate::item_tree::ItemTreeVTable; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeVTable` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::ItemTreeRc`, `crate::item_tree::ItemTreeVTable`, `crate::item_tree::ItemTreeWeak` [INFO] [stderr] --> component_factory.rs:8:24 [INFO] [stderr] | [INFO] [stderr] 8 | use crate::item_tree::{ItemTreeRc, ItemTreeVTable, ItemTreeWeak}; [INFO] [stderr] | ^^^^^^^^^^ ^^^^^^^^^^^^^^ ^^^^^^^^^^^^ no `ItemTreeWeak` in `item_tree` [INFO] [stderr] | | | [INFO] [stderr] | | no `ItemTreeVTable` in `item_tree` [INFO] [stderr] | no `ItemTreeRc` in `item_tree` [INFO] [stderr] | [INFO] [stderr] note: type alias `crate::model::ItemTreeRc` exists but is inaccessible [INFO] [stderr] --> model.rs:30:1 [INFO] [stderr] | [INFO] [stderr] 30 | type ItemTreeRc = vtable::VRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not accessible [INFO] [stderr] = note: unresolved item `crate::api::weak_handle::ItemTreeVTable` exists but is inaccessible [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeRc` [INFO] [stderr] --> input.rs:8:5 [INFO] [stderr] | [INFO] [stderr] 8 | use crate::item_tree::ItemTreeRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeRc` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::ItemRc`, `crate::item_tree::ItemWeak`, `crate::item_tree::VisitChildrenResult` [INFO] [stderr] --> input.rs:9:24 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::item_tree::{ItemRc, ItemWeak, VisitChildrenResult}; [INFO] [stderr] | ^^^^^^ ^^^^^^^^ ^^^^^^^^^^^^^^^^^^^ no `VisitChildrenResult` in `item_tree` [INFO] [stderr] | | | [INFO] [stderr] | | no `ItemWeak` in `item_tree` [INFO] [stderr] | no `ItemRc` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeNodeArray` [INFO] [stderr] --> item_focus.rs:10:5 [INFO] [stderr] | [INFO] [stderr] 10 | use crate::item_tree::ItemTreeNodeArray; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeNodeArray` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeNode` [INFO] [stderr] --> item_focus.rs:66:9 [INFO] [stderr] | [INFO] [stderr] 66 | use crate::item_tree::ItemTreeNode; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeNode` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeRc` [INFO] [stderr] --> item_rendering.rs:10:5 [INFO] [stderr] | [INFO] [stderr] 10 | use crate::item_tree::ItemTreeRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeRc` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::ItemVisitor`, `crate::item_tree::ItemVisitorResult`, `crate::item_tree::ItemVisitorVTable`, `crate::item_tree::VisitChildrenResult` [INFO] [stderr] --> item_rendering.rs:11:24 [INFO] [stderr] | [INFO] [stderr] 11 | use crate::item_tree::{ItemVisitor, ItemVisitorResult, ItemVisitorVTable, VisitChildrenResult}; [INFO] [stderr] | ^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^ no `VisitChildrenResult` in `item_tree` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `ItemVisitorVTable` in `item_tree` [INFO] [stderr] | | no `ItemVisitorResult` in `item_tree` [INFO] [stderr] | no `ItemVisitor` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemRc` [INFO] [stderr] --> items.rs:29:9 [INFO] [stderr] | [INFO] [stderr] 29 | pub use crate::item_tree::ItemRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemRc` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::IndexRange`, `crate::item_tree::ItemTreeRc`, `crate::item_tree::ItemTreeWeak`, `crate::item_tree::ItemWeak` [INFO] [stderr] --> items/component_container.rs:17:24 [INFO] [stderr] | [INFO] [stderr] 17 | use crate::item_tree::{IndexRange, ItemTreeRc, ItemTreeWeak, ItemWeak}; [INFO] [stderr] | ^^^^^^^^^^ ^^^^^^^^^^ ^^^^^^^^^^^^ ^^^^^^^^ no `ItemWeak` in `item_tree` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `ItemTreeWeak` in `item_tree` [INFO] [stderr] | | no `ItemTreeRc` in `item_tree` [INFO] [stderr] | no `IndexRange` in `item_tree` [INFO] [stderr] | [INFO] [stderr] note: type alias `crate::model::ItemTreeRc` exists but is inaccessible [INFO] [stderr] --> model.rs:30:1 [INFO] [stderr] | [INFO] [stderr] 30 | type ItemTreeRc = vtable::VRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not accessible [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::ItemTreeNode`, `crate::item_tree::ItemVisitorVTable`, `crate::item_tree::TraversalOrder`, `crate::item_tree::VisitChildrenResult` [INFO] [stderr] --> items/component_container.rs:18:24 [INFO] [stderr] | [INFO] [stderr] 18 | use crate::item_tree::{ItemTreeNode, ItemVisitorVTable, TraversalOrder, VisitChildrenResult}; [INFO] [stderr] | ^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^ no `VisitChildrenResult` in `item_tree` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `TraversalOrder` in `item_tree` [INFO] [stderr] | | no `ItemVisitorVTable` in `item_tree` [INFO] [stderr] | no `ItemTreeNode` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeVTable` [INFO] [stderr] --> model.rs:8:5 [INFO] [stderr] | [INFO] [stderr] 8 | use crate::item_tree::ItemTreeVTable; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeVTable` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::TraversalOrder` [INFO] [stderr] --> model.rs:9:5 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::item_tree::TraversalOrder; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemTreeRef` [INFO] [stderr] --> renderer.rs:10:5 [INFO] [stderr] | [INFO] [stderr] 10 | use crate::item_tree::ItemTreeRef; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemTreeRef` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::item_tree::ItemRc` [INFO] [stderr] --> window.rs:18:5 [INFO] [stderr] | [INFO] [stderr] 18 | use crate::item_tree::ItemRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ no `ItemRc` in `item_tree` [INFO] [stderr] | [INFO] [stderr] help: consider importing this unresolved item through its public re-export instead [INFO] [stderr] | [INFO] [stderr] 18 | use crate::items::ItemRc; [INFO] [stderr] | ~~~~~~~~~~~~~~~~~~~~ [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::item_tree::ItemTreeRc`, `crate::item_tree::ItemTreeRef`, `crate::item_tree::ItemTreeVTable`, `crate::item_tree::ItemTreeWeak` [INFO] [stderr] --> window.rs:19:24 [INFO] [stderr] | [INFO] [stderr] 19 | use crate::item_tree::{ItemTreeRc, ItemTreeRef, ItemTreeVTable, ItemTreeWeak}; [INFO] [stderr] | ^^^^^^^^^^ ^^^^^^^^^^^ ^^^^^^^^^^^^^^ ^^^^^^^^^^^^ no `ItemTreeWeak` in `item_tree` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `ItemTreeVTable` in `item_tree` [INFO] [stderr] | | no `ItemTreeRef` in `item_tree` [INFO] [stderr] | no `ItemTreeRc` in `item_tree` [INFO] [stderr] | [INFO] [stderr] note: type alias `crate::model::ItemTreeRc` exists but is inaccessible [INFO] [stderr] --> model.rs:30:1 [INFO] [stderr] | [INFO] [stderr] 30 | type ItemTreeRc = vtable::VRc; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not accessible [INFO] [stderr] = note: unresolved item `crate::model::model_peer::ItemTreeVTable` exists but is inaccessible [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::graphics::Image` [INFO] [stderr] --> item_rendering.rs:9:43 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::graphics::{CachedGraphicsData, Image, IntRect}; [INFO] [stderr] | ^^^^^ [INFO] [stderr] | | [INFO] [stderr] | no `Image` in `graphics` [INFO] [stderr] | help: a similar name exists in the module (notice the capitalization): `image` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `graphics::ImageInner`, `graphics::StaticTextures` [INFO] [stderr] --> lib.rs:60:20 [INFO] [stderr] | [INFO] [stderr] 60 | pub use graphics::{ImageInner, StaticTextures}; [INFO] [stderr] | ^^^^^^^^^^ ^^^^^^^^^^^^^^ no `StaticTextures` in `graphics` [INFO] [stderr] | | [INFO] [stderr] | no `ImageInner` in `graphics` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `TraversalOrder` in `item_tree` [INFO] [stderr] --> input.rs:735:27 [INFO] [stderr] | [INFO] [stderr] 735 | crate::item_tree::TraversalOrder::FrontToBack, [INFO] [stderr] | ^^^^^^^^^^^^^^ could not find `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `TraversalOrder` in `item_tree` [INFO] [stderr] --> input.rs:809:31 [INFO] [stderr] | [INFO] [stderr] 809 | crate::item_tree::TraversalOrder::FrontToBack, [INFO] [stderr] | ^^^^^^^^^^^^^^ could not find `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `ItemTreeRef` in `item_tree` [INFO] [stderr] --> item_rendering.rs:165:31 [INFO] [stderr] | [INFO] [stderr] 165 | crate::item_tree::ItemTreeRef::as_ptr(component).cast().as_ptr(); [INFO] [stderr] | ^^^^^^^^^^^ could not find `ItemTreeRef` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `TraversalOrder` in `item_tree` [INFO] [stderr] --> item_rendering.rs:222:27 [INFO] [stderr] | [INFO] [stderr] 222 | crate::item_tree::TraversalOrder::BackToFront, [INFO] [stderr] | ^^^^^^^^^^^^^^ could not find `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `TraversalOrder` in `item_tree` [INFO] [stderr] --> item_rendering.rs:273:27 [INFO] [stderr] | [INFO] [stderr] 273 | crate::item_tree::TraversalOrder::BackToFront, [INFO] [stderr] | ^^^^^^^^^^^^^^ could not find `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `TraversalOrder` in `item_tree` [INFO] [stderr] --> item_rendering.rs:604:31 [INFO] [stderr] | [INFO] [stderr] 604 | crate::item_tree::TraversalOrder::BackToFront, [INFO] [stderr] | ^^^^^^^^^^^^^^ could not find `TraversalOrder` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `VisitChildrenResult` in `item_tree` [INFO] [stderr] --> model.rs:1173:46 [INFO] [stderr] | [INFO] [stderr] 1173 | return crate::item_tree::VisitChildrenResult::abort(i, 0); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ could not find `VisitChildrenResult` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0433]: failed to resolve: could not find `VisitChildrenResult` in `item_tree` [INFO] [stderr] --> model.rs:1177:27 [INFO] [stderr] | [INFO] [stderr] 1177 | crate::item_tree::VisitChildrenResult::CONTINUE [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ could not find `VisitChildrenResult` in `item_tree` [INFO] [stderr] [INFO] [stderr] error[E0405]: cannot find trait `ItemVisitor` in module `crate::item_tree` [INFO] [stderr] --> input.rs:732:115 [INFO] [stderr] | [INFO] [stderr] 732 | ...ee::ItemVisitorVTable> for crate::item_tree::ItemVisitor = &mut actual_visitor); [INFO] [stderr] | ^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemVisitorVTable` in module `crate::item_tree` [INFO] [stderr] --> input.rs:732:74 [INFO] [stderr] | [INFO] [stderr] 732 | vtable::new_vref!(let mut actual_visitor : VRefMut for crate::item_tree::ItemVisitor = &mut actu... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0405]: cannot find trait `ItemVisitor` in module `crate::item_tree` [INFO] [stderr] --> input.rs:806:119 [INFO] [stderr] | [INFO] [stderr] 806 | ...ee::ItemVisitorVTable> for crate::item_tree::ItemVisitor = &mut actual_visitor); [INFO] [stderr] | ^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemVisitorVTable` in module `crate::item_tree` [INFO] [stderr] --> input.rs:806:78 [INFO] [stderr] | [INFO] [stderr] 806 | ... vtable::new_vref!(let mut actual_visitor : VRefMut for crate::item_tree::ItemVisitor = &mut ac... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemTreeNodeArray` in module `crate::item_tree` [INFO] [stderr] --> item_focus.rs:14:35 [INFO] [stderr] | [INFO] [stderr] 14 | item_tree: &crate::item_tree::ItemTreeNodeArray, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemTreeNodeArray` in module `crate::item_tree` [INFO] [stderr] --> item_focus.rs:31:35 [INFO] [stderr] | [INFO] [stderr] 31 | item_tree: &crate::item_tree::ItemTreeNodeArray, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemTreeNodeArray` in module `crate::item_tree` [INFO] [stderr] --> item_focus.rs:53:35 [INFO] [stderr] | [INFO] [stderr] 53 | item_tree: &crate::item_tree::ItemTreeNodeArray, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemTreeRef` in module `crate::item_tree` [INFO] [stderr] --> item_rendering.rs:163:68 [INFO] [stderr] | [INFO] [stderr] 163 | pub fn component_destroyed(&self, component: crate::item_tree::ItemTreeRef) { [INFO] [stderr] | ^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> item_rendering.rs:426:61 [INFO] [stderr] | [INFO] [stderr] 426 | fn draw_image_direct(&mut self, image: crate::graphics::Image); [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0425]: cannot find function `visit_items` in module `crate::item_tree` [INFO] [stderr] --> item_rendering.rs:602:27 [INFO] [stderr] | [INFO] [stderr] 602 | crate::item_tree::visit_items( [INFO] [stderr] | ^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics::image` [INFO] [stderr] --> item_rendering.rs:859:68 [INFO] [stderr] | [INFO] [stderr] 859 | fn draw_image_direct(&mut self, image: crate::graphics::image::Image) { [INFO] [stderr] | ^^^^^ not found in `crate::graphics::image` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:36:43 [INFO] [stderr] | [INFO] [stderr] 36 | pub source: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:118:53 [INFO] [stderr] | [INFO] [stderr] 118 | fn source(self: Pin<&Self>) -> crate::graphics::Image { [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:159:43 [INFO] [stderr] | [INFO] [stderr] 159 | pub source: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:255:53 [INFO] [stderr] | [INFO] [stderr] 255 | fn source(self: Pin<&Self>) -> crate::graphics::Image { [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items.rs:1258:41 [INFO] [stderr] | [INFO] [stderr] 1258 | pub icon: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemTreeVTable` in module `crate::item_tree` [INFO] [stderr] --> model.rs:30:52 [INFO] [stderr] | [INFO] [stderr] 30 | type ItemTreeRc = vtable::VRc; [INFO] [stderr] | ^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0405]: cannot find trait `ItemTree` in module `crate::item_tree` [INFO] [stderr] --> model.rs:690:23 [INFO] [stderr] | [INFO] [stderr] 690 | crate::item_tree::ItemTree + vtable::HasStaticVTable + 'static [INFO] [stderr] | ^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemVisitorRefMut` in module `crate::item_tree` [INFO] [stderr] --> model.rs:1163:40 [INFO] [stderr] | [INFO] [stderr] 1163 | mut visitor: crate::item_tree::ItemVisitorRefMut, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `VisitChildrenResult` in module `crate::item_tree` [INFO] [stderr] --> model.rs:1164:28 [INFO] [stderr] | [INFO] [stderr] 1164 | ) -> crate::item_tree::VisitChildrenResult { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `ItemWeak` in module `crate::item_tree` [INFO] [stderr] --> window.rs:394:47 [INFO] [stderr] | [INFO] [stderr] 394 | pub focus_item: RefCell, [INFO] [stderr] | ^^^^^^^^ not found in `crate::item_tree` [INFO] [stderr] [INFO] [stderr] error: aborting due to 49 previous errors [INFO] [stderr] [INFO] [stderr] Some errors have detailed explanations: E0405, E0412, E0425, E0432, E0433. [INFO] [stderr] For more information about an error, try `rustc --explain E0405`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:406:45 [INFO] [stdout] | [INFO] [stdout] 406 | let arr = crate::SharedVector::from(core::slice::from_raw_parts(first_element, count)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/path.rs:401:5 [INFO] [stdout] | [INFO] [stdout] 401 | / pub unsafe extern "C" fn slint_new_path_elements( [INFO] [stdout] 402 | | out: *mut c_void, [INFO] [stdout] 403 | | first_element: *const PathElement, [INFO] [stdout] 404 | | count: usize, [INFO] [stdout] 405 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(unsafe_op_in_unsafe_fn)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:407:9 [INFO] [stdout] | [INFO] [stdout] 407 | core::ptr::write(out as *mut crate::SharedVector, arr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:421:39 [INFO] [stdout] | [INFO] [stdout] 421 | crate::SharedVector::from(core::slice::from_raw_parts(first_event, event_count)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/path.rs:412:5 [INFO] [stdout] | [INFO] [stdout] 412 | / pub unsafe extern "C" fn slint_new_path_events( [INFO] [stdout] 413 | | out_events: *mut c_void, [INFO] [stdout] 414 | | out_coordinates: *mut c_void, [INFO] [stdout] 415 | | first_event: *const PathEvent, [INFO] [stdout] ... | [INFO] [stdout] 418 | | coordinate_count: usize, [INFO] [stdout] 419 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | core::ptr::write(out_events as *mut crate::SharedVector, events); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:423:53 [INFO] [stdout] | [INFO] [stdout] 423 | let coordinates = crate::SharedVector::from(core::slice::from_raw_parts( [INFO] [stdout] | _____________________________________________________^ [INFO] [stdout] 424 | | first_coordinate, [INFO] [stdout] 425 | | coordinate_count, [INFO] [stdout] 426 | | )); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:427:9 [INFO] [stdout] | [INFO] [stdout] 427 | core::ptr::write(out_coordinates as *mut crate::SharedVector, coordinates); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 35 | / OpaqueImageVTable_static! { [INFO] [stdout] 36 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 37 | | pub static PARSED_SVG_VT for svg::ParsedSVG [INFO] [stdout] 38 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 35 | / OpaqueImageVTable_static! { [INFO] [stdout] 36 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 37 | | pub static PARSED_SVG_VT for svg::ParsedSVG [INFO] [stdout] 38 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `OpaqueImageVTable_static` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 46 | / OpaqueImageVTable_static! { [INFO] [stdout] 47 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 48 | | pub static NINE_SLICE_VT for NineSliceImage [INFO] [stdout] 49 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 46 | / OpaqueImageVTable_static! { [INFO] [stdout] 47 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 48 | | pub static NINE_SLICE_VT for NineSliceImage [INFO] [stdout] 49 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `OpaqueImageVTable_static` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `graphics::image::BorrowedOpenGLTextureBuilder::new_gl_2d_rgba_texture` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:696:9 [INFO] [stdout] | [INFO] [stdout] 696 | BorrowedOpenGLTextureBuilder::new_gl_2d_rgba_texture(texture_id, size).build() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:692:5 [INFO] [stdout] | [INFO] [stdout] 692 | / pub unsafe fn from_borrowed_gl_2d_rgba_texture( [INFO] [stdout] 693 | | texture_id: core::num::NonZeroU32, [INFO] [stdout] 694 | | size: IntSize, [INFO] [stdout] 695 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> item_tree.rs:42:1 [INFO] [stdout] | [INFO] [stdout] 42 | #[vtable] [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1179 | crate::item_tree::ItemTreeVTable_static!(static TEST_COMPONENT_VT for TestItemTree); [INFO] [stdout] | ----------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> item_tree.rs:42:1 [INFO] [stdout] | [INFO] [stdout] 42 | #[vtable] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1179 | crate::item_tree::ItemTreeVTable_static!(static TEST_COMPONENT_VT for TestItemTree); [INFO] [stdout] | ----------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `crate::item_tree::ItemTreeVTable_static` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:119:13 [INFO] [stdout] | [INFO] [stdout] 119 | (*to).0.set((*from).0.get()); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:118:9 [INFO] [stdout] | [INFO] [stdout] 118 | pub unsafe fn mem_move(from: *mut Self, to: *mut Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:119:25 [INFO] [stdout] | [INFO] [stdout] 119 | (*to).0.set((*from).0.get()); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:120:33 [INFO] [stdout] | [INFO] [stdout] 120 | if let Some(next) = ((*from).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:120:34 [INFO] [stdout] | [INFO] [stdout] 120 | if let Some(next) = ((*from).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:163:33 [INFO] [stdout] | [INFO] [stdout] 163 | if let Some(next) = ((*_self).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:162:9 [INFO] [stdout] | [INFO] [stdout] 162 | pub unsafe fn drop(_self: *mut Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:163:34 [INFO] [stdout] | [INFO] [stdout] 163 | if let Some(next) = ((*_self).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:421:14 [INFO] [stdout] | [INFO] [stdout] 421 | drop(Box::from_raw(_self as *mut BindingHolder)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:420:5 [INFO] [stdout] | [INFO] [stdout] 420 | unsafe fn binding_drop(_self: *mut BindingHolder) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:430:29 [INFO] [stdout] | [INFO] [stdout] 430 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:426:5 [INFO] [stdout] | [INFO] [stdout] 426 | / unsafe fn evaluate( [INFO] [stdout] 427 | | _self: *mut BindingHolder, [INFO] [stdout] 428 | | value: *mut (), [INFO] [stdout] 429 | | ) -> BindingResult { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:430:49 [INFO] [stdout] | [INFO] [stdout] 430 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::evaluate` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:13 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:13 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:34 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:438:9 [INFO] [stdout] | [INFO] [stdout] 438 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).mark_dirty() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:437:5 [INFO] [stdout] | [INFO] [stdout] 437 | unsafe fn mark_dirty(_self: *const BindingHolder, _: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:438:30 [INFO] [stdout] | [INFO] [stdout] 438 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).mark_dirty() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::intercept_set` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:9 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:442:5 [INFO] [stdout] | [INFO] [stdout] 442 | / unsafe fn intercept_set( [INFO] [stdout] 443 | | _self: *const BindingHolder, [INFO] [stdout] 444 | | value: *const (), [INFO] [stdout] 445 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:9 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:30 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::intercept_set_binding` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | / Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] 454 | | .intercept_set_binding(new_binding) [INFO] [stdout] | |_______________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:449:5 [INFO] [stdout] | [INFO] [stdout] 449 | / unsafe fn intercept_set_binding( [INFO] [stdout] 450 | | _self: *const BindingHolder, [INFO] [stdout] 451 | | new_binding: *mut BindingHolder, [INFO] [stdout] 452 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:30 [INFO] [stdout] | [INFO] [stdout] 453 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:628:29 [INFO] [stdout] | [INFO] [stdout] 628 | let r = (binding.vtable.evaluate)( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 629 | | binding.as_mut().get_unchecked_mut() as *mut BindingHolder, [INFO] [stdout] 630 | | value as *mut (), [INFO] [stdout] 631 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:622:5 [INFO] [stdout] | [INFO] [stdout] 622 | unsafe fn update(&self, value: *mut T) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::<&'a mut T>::get_unchecked_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:629:25 [INFO] [stdout] | [INFO] [stdout] 629 | binding.as_mut().get_unchecked_mut() as *mut BindingHolder, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:715:9 [INFO] [stdout] | [INFO] [stdout] 715 | *(dependencies as *mut *const u32), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:713:1 [INFO] [stdout] | [INFO] [stdout] 713 | unsafe fn mark_dependencies_dirty(dependencies: *mut DependencyListHead) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:718:35 [INFO] [stdout] | [INFO] [stdout] 718 | DependencyListHead::for_each(&*dependencies, |binding| { [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:719:40 [INFO] [stdout] | [INFO] [stdout] 719 | let binding: &BindingHolder = &**binding; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:721:9 [INFO] [stdout] | [INFO] [stdout] 721 | (binding.vtable.mark_dirty)(binding as *const BindingHolder, was_dirty); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:725:17 [INFO] [stdout] | [INFO] [stdout] 725 | *(binding.dependencies.as_ptr() as *mut *const u32), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::mark_dependencies_dirty` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:732:13 [INFO] [stdout] | [INFO] [stdout] 732 | mark_dependencies_dirty(binding.dependencies.as_ptr() as *mut DependencyListHead) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1019:17 [INFO] [stdout] | [INFO] [stdout] 1019 | *(value as *mut T) = self.common_property.as_ref().get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1018:13 [INFO] [stdout] | [INFO] [stdout] 1018 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1024:51 [INFO] [stdout] | [INFO] [stdout] 1024 | self.common_property.as_ref().set((*(value as *const T)).clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1023:13 [INFO] [stdout] | [INFO] [stdout] 1023 | unsafe fn intercept_set(self: Pin<&Self>, value: *const ()) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:65:33 [INFO] [stdout] | [INFO] [stdout] 65 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:61:9 [INFO] [stdout] | [INFO] [stdout] 61 | / unsafe fn evaluate T, NF: Fn(&Data, &T), Data>( [INFO] [stdout] 62 | | _self: *mut BindingHolder, [INFO] [stdout] 63 | | _value: *mut (), [INFO] [stdout] 64 | | ) -> BindingResult { [INFO] [stdout] | |__________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:65:53 [INFO] [stdout] | [INFO] [stdout] 65 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:67:25 [INFO] [stdout] | [INFO] [stdout] 67 | let inner = core::ptr::addr_of_mut!((*_self).binding).as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:67:49 [INFO] [stdout] | [INFO] [stdout] 67 | let inner = core::ptr::addr_of_mut!((*_self).binding).as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:78:29 [INFO] [stdout] | [INFO] [stdout] 78 | core::mem::drop(Box::from_raw( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 79 | | _self as *mut BindingHolder>, [INFO] [stdout] 80 | | )); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | unsafe fn drop(_self: *mut BindingHolder) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:155:21 [INFO] [stdout] | [INFO] [stdout] 155 | let _self = _self.as_ref().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:153:5 [INFO] [stdout] | [INFO] [stdout] 153 | pub(super) unsafe fn mark_dirty(_self: *const BindingHolder, _was_dirty: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:115:32 [INFO] [stdout] | [INFO] [stdout] 115 | let original_binding = Pin::new_unchecked(&self.original_binding); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/properties_animations.rs:114:5 [INFO] [stdout] | [INFO] [stdout] 114 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:123:17 [INFO] [stdout] | [INFO] [stdout] 123 | *(value as *mut T) = val; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::PropertyHandle::update` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 132 | self.original_binding.update(value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:135:34 [INFO] [stdout] | [INFO] [stdout] 135 | let value = &mut *(value as *mut T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::PropertyHandle::update` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:140:17 [INFO] [stdout] | [INFO] [stdout] 140 | self.original_binding.update((&mut animation_data.to_value) as *mut T as *mut ()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1329:26 [INFO] [stdout] | [INFO] [stdout] 1329 | let value = &mut *(value as *mut StateInfo); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1327:5 [INFO] [stdout] | [INFO] [stdout] 1327 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1502:17 [INFO] [stdout] | [INFO] [stdout] 1502 | Pin::new_unchecked(&(*(_self as *const BindingHolder)).binding).notify(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1497:9 [INFO] [stdout] | [INFO] [stdout] 1497 | / unsafe fn mark_dirty( [INFO] [stdout] 1498 | | _self: *const BindingHolder, [INFO] [stdout] 1499 | | was_dirty: bool, [INFO] [stdout] 1500 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1502:37 [INFO] [stdout] | [INFO] [stdout] 1502 | Pin::new_unchecked(&(*(_self as *const BindingHolder)).binding).notify(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:35:22 [INFO] [stdout] | [INFO] [stdout] 35 | debug_assert_eq!(inner.as_ref().header.refcount.load(atomic::Ordering::Relaxed), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> sharedvector.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | unsafe fn drop_inner(mut inner: NonNull>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:36:20 [INFO] [stdout] | [INFO] [stdout] 36 | let data_ptr = inner.as_mut().data.as_mut_ptr(); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:37:17 [INFO] [stdout] | [INFO] [stdout] 37 | for x in 0..inner.as_ref().header.size { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:38:9 [INFO] [stdout] | [INFO] [stdout] 38 | core::ptr::drop_in_place(data_ptr.add(x)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:38:34 [INFO] [stdout] | [INFO] [stdout] 38 | core::ptr::drop_in_place(data_ptr.add(x)); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | / alloc::alloc::dealloc( [INFO] [stdout] 41 | | inner.as_ptr() as *mut u8, [INFO] [stdout] 42 | | compute_inner_layout::(inner.as_ref().header.capacity), [INFO] [stdout] 43 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:42:35 [INFO] [stdout] | [INFO] [stdout] 42 | compute_inner_layout::(inner.as_ref().header.capacity), [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 61 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `i_slint_core` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * graphics/image.rs [INFO] [stderr] * item_rendering.rs [INFO] [stderr] * items.rs [INFO] [stderr] * items/image.rs [INFO] [stderr] * lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error: expected item after attributes [INFO] [stderr] --> graphics/image.rs:22:1 [INFO] [stderr] | [INFO] [stderr] 22 | #[allow(missing_docs)] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::graphics::Image` [INFO] [stderr] --> item_rendering.rs:9:43 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::graphics::{CachedGraphicsData, Image, IntRect}; [INFO] [stderr] | ^^^^^ [INFO] [stderr] | | [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:406:45 [INFO] [stdout] | [INFO] [stdout] 406 | let arr = crate::SharedVector::from(core::slice::from_raw_parts(first_element, count)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/path.rs:401:5 [INFO] [stdout] | [INFO] [stdout] 401 | / pub unsafe extern "C" fn slint_new_path_elements( [INFO] [stdout] 402 | | out: *mut c_void, [INFO] [stdout] 403 | | first_element: *const PathElement, [INFO] [stdout] 404 | | count: usize, [INFO] [stdout] 405 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(unsafe_op_in_unsafe_fn)]` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | no `Image` in `graphics` [INFO] [stderr] | help: a similar name exists in the module (notice the capitalization): `image` [INFO] [stderr] [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:407:9 [INFO] [stdout] | [INFO] [stdout] 407 | core::ptr::write(out as *mut crate::SharedVector, arr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error[E0432]: unresolved imports `graphics::ImageInner`, `graphics::StaticTextures` [INFO] [stderr] --> lib.rs:60:20 [INFO] [stderr] | [INFO] [stderr] 60 | pub use graphics::{ImageInner, StaticTextures}; [INFO] [stderr] | ^^^^^^^^^^ ^^^^^^^^^^^^^^ no `StaticTextures` in `graphics` [INFO] [stderr] | | [INFO] [stderr] | no `ImageInner` in `graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> item_rendering.rs:426:61 [INFO] [stderr] | [INFO] [stderr] 426 | fn draw_image_direct(&mut self, image: crate::graphics::Image); [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics::image` [INFO] [stderr] --> item_rendering.rs:859:68 [INFO] [stderr] | [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:421:39 [INFO] [stdout] | [INFO] [stdout] 421 | crate::SharedVector::from(core::slice::from_raw_parts(first_event, event_count)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/path.rs:412:5 [INFO] [stdout] | [INFO] [stdout] 412 | / pub unsafe extern "C" fn slint_new_path_events( [INFO] [stdout] 413 | | out_events: *mut c_void, [INFO] [stdout] 414 | | out_coordinates: *mut c_void, [INFO] [stdout] 415 | | first_event: *const PathEvent, [INFO] [stdout] ... | [INFO] [stdout] 418 | | coordinate_count: usize, [INFO] [stdout] 419 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 859 | fn draw_image_direct(&mut self, image: crate::graphics::image::Image) { [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | core::ptr::write(out_events as *mut crate::SharedVector, events); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^ not found in `crate::graphics::image` [INFO] [stdout] warning: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:423:53 [INFO] [stdout] | [INFO] [stdout] 423 | let coordinates = crate::SharedVector::from(core::slice::from_raw_parts( [INFO] [stdout] | _____________________________________________________^ [INFO] [stdout] 424 | | first_coordinate, [INFO] [stdout] 425 | | coordinate_count, [INFO] [stdout] 426 | | )); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:36:43 [INFO] [stdout] warning: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/path.rs:427:9 [INFO] [stdout] | [INFO] [stdout] 427 | core::ptr::write(out_coordinates as *mut crate::SharedVector, coordinates); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] 36 | pub source: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:118:53 [INFO] [stderr] | [INFO] [stderr] 118 | fn source(self: Pin<&Self>) -> crate::graphics::Image { [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:159:43 [INFO] [stderr] | [INFO] [stderr] 159 | pub source: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items/image.rs:255:53 [INFO] [stderr] | [INFO] [stderr] 255 | fn source(self: Pin<&Self>) -> crate::graphics::Image { [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0412]: cannot find type `Image` in module `crate::graphics` [INFO] [stderr] --> items.rs:1258:41 [INFO] [stderr] | [INFO] [stderr] 1258 | pub icon: Property, [INFO] [stderr] | ^^^^^ not found in `crate::graphics` [INFO] [stderr] [INFO] [stderr] error[E0493]: destructor of `WindowItemFieldsOffsets` cannot be evaluated at compile-time [INFO] [stderr] --> items.rs:1353:9 [INFO] [stderr] | [INFO] [stderr] 1353 | Self::FIELD_OFFSETS.cached_rendering_data.as_unpinned_projection(); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ - value is dropped here [INFO] [stderr] | | [INFO] [stderr] | the destructor for this type cannot be evaluated in constants [INFO] [stderr] [INFO] [stderr] error[E0493]: destructor of `ImageItemFieldsOffsets` cannot be evaluated at compile-time [INFO] [stderr] --> items/image.rs:151:9 [INFO] [stderr] | [INFO] [stderr] 151 | > = ImageItem::FIELD_OFFSETS.cached_rendering_data.as_unpinned_projection(); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ - value is dropped here [INFO] [stderr] | | [INFO] [stderr] | the destructor for this type cannot be evaluated in constants [INFO] [stderr] [INFO] [stderr] error[E0493]: destructor of `ClippedImageFieldsOffsets` cannot be evaluated at compile-time [INFO] [stderr] --> items/image.rs:293:9 [INFO] [stderr] | [INFO] [stderr] 293 | > = ClippedImage::FIELD_OFFSETS.cached_rendering_data.as_unpinned_projection(); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ - value is dropped here [INFO] [stderr] | | [INFO] [stderr] | the destructor for this type cannot be evaluated in constants [INFO] [stderr] [INFO] [stderr] error: aborting due to 13 previous errors [INFO] [stderr] [INFO] [stderr] Some errors have detailed explanations: E0412, E0432, E0493. [INFO] [stderr] For more information about an error, try `rustc --explain E0412`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 35 | / OpaqueImageVTable_static! { [INFO] [stdout] 36 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 37 | | pub static PARSED_SVG_VT for svg::ParsedSVG [INFO] [stdout] 38 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 35 | / OpaqueImageVTable_static! { [INFO] [stdout] 36 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 37 | | pub static PARSED_SVG_VT for svg::ParsedSVG [INFO] [stdout] 38 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `OpaqueImageVTable_static` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 46 | / OpaqueImageVTable_static! { [INFO] [stdout] 47 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 48 | | pub static NINE_SLICE_VT for NineSliceImage [INFO] [stdout] 49 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | #[vtable::vtable] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 46 | / OpaqueImageVTable_static! { [INFO] [stdout] 47 | | /// VTable for RC wrapped SVG helper struct. [INFO] [stdout] 48 | | pub static NINE_SLICE_VT for NineSliceImage [INFO] [stdout] 49 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `OpaqueImageVTable_static` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `graphics::image::BorrowedOpenGLTextureBuilder::new_gl_2d_rgba_texture` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> graphics/image.rs:696:9 [INFO] [stdout] | [INFO] [stdout] 696 | BorrowedOpenGLTextureBuilder::new_gl_2d_rgba_texture(texture_id, size).build() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> graphics/image.rs:692:5 [INFO] [stdout] | [INFO] [stdout] 692 | / pub unsafe fn from_borrowed_gl_2d_rgba_texture( [INFO] [stdout] 693 | | texture_id: core::num::NonZeroU32, [INFO] [stdout] 694 | | size: IntSize, [INFO] [stdout] 695 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:119:13 [INFO] [stdout] | [INFO] [stdout] 119 | (*to).0.set((*from).0.get()); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:118:9 [INFO] [stdout] | [INFO] [stdout] 118 | pub unsafe fn mem_move(from: *mut Self, to: *mut Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:119:25 [INFO] [stdout] | [INFO] [stdout] 119 | (*to).0.set((*from).0.get()); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:120:33 [INFO] [stdout] | [INFO] [stdout] 120 | if let Some(next) = ((*from).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:120:34 [INFO] [stdout] | [INFO] [stdout] 120 | if let Some(next) = ((*from).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:163:33 [INFO] [stdout] | [INFO] [stdout] 163 | if let Some(next) = ((*_self).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:162:9 [INFO] [stdout] | [INFO] [stdout] 162 | pub unsafe fn drop(_self: *mut Self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:163:34 [INFO] [stdout] | [INFO] [stdout] 163 | if let Some(next) = ((*_self).0.get() as *const DependencyNode).as_ref() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:421:14 [INFO] [stdout] | [INFO] [stdout] 421 | drop(Box::from_raw(_self as *mut BindingHolder)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:420:5 [INFO] [stdout] | [INFO] [stdout] 420 | unsafe fn binding_drop(_self: *mut BindingHolder) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:430:29 [INFO] [stdout] | [INFO] [stdout] 430 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:426:5 [INFO] [stdout] | [INFO] [stdout] 426 | / unsafe fn evaluate( [INFO] [stdout] 427 | | _self: *mut BindingHolder, [INFO] [stdout] 428 | | value: *mut (), [INFO] [stdout] 429 | | ) -> BindingResult { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:430:49 [INFO] [stdout] | [INFO] [stdout] 430 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::evaluate` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:13 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:13 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:432:34 [INFO] [stdout] | [INFO] [stdout] 432 | Pin::new_unchecked(&((*(_self as *mut BindingHolder)).binding)).evaluate(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:438:9 [INFO] [stdout] | [INFO] [stdout] 438 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).mark_dirty() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:437:5 [INFO] [stdout] | [INFO] [stdout] 437 | unsafe fn mark_dirty(_self: *const BindingHolder, _: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:438:30 [INFO] [stdout] | [INFO] [stdout] 438 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).mark_dirty() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::intercept_set` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:9 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:442:5 [INFO] [stdout] | [INFO] [stdout] 442 | / unsafe fn intercept_set( [INFO] [stdout] 443 | | _self: *const BindingHolder, [INFO] [stdout] 444 | | value: *const (), [INFO] [stdout] 445 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:9 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:446:30 [INFO] [stdout] | [INFO] [stdout] 446 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)).intercept_set(value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::BindingCallable::intercept_set_binding` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | / Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] 454 | | .intercept_set_binding(new_binding) [INFO] [stdout] | |_______________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:449:5 [INFO] [stdout] | [INFO] [stdout] 449 | / unsafe fn intercept_set_binding( [INFO] [stdout] 450 | | _self: *const BindingHolder, [INFO] [stdout] 451 | | new_binding: *mut BindingHolder, [INFO] [stdout] 452 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:9 [INFO] [stdout] | [INFO] [stdout] 453 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:453:30 [INFO] [stdout] | [INFO] [stdout] 453 | Pin::new_unchecked(&((*(_self as *const BindingHolder)).binding)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:628:29 [INFO] [stdout] | [INFO] [stdout] 628 | let r = (binding.vtable.evaluate)( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 629 | | binding.as_mut().get_unchecked_mut() as *mut BindingHolder, [INFO] [stdout] 630 | | value as *mut (), [INFO] [stdout] 631 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:622:5 [INFO] [stdout] | [INFO] [stdout] 622 | unsafe fn update(&self, value: *mut T) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::<&'a mut T>::get_unchecked_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:629:25 [INFO] [stdout] | [INFO] [stdout] 629 | binding.as_mut().get_unchecked_mut() as *mut BindingHolder, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:715:9 [INFO] [stdout] | [INFO] [stdout] 715 | *(dependencies as *mut *const u32), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:713:1 [INFO] [stdout] | [INFO] [stdout] 713 | unsafe fn mark_dependencies_dirty(dependencies: *mut DependencyListHead) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:718:35 [INFO] [stdout] | [INFO] [stdout] 718 | DependencyListHead::for_each(&*dependencies, |binding| { [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:719:40 [INFO] [stdout] | [INFO] [stdout] 719 | let binding: &BindingHolder = &**binding; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:721:9 [INFO] [stdout] | [INFO] [stdout] 721 | (binding.vtable.mark_dirty)(binding as *const BindingHolder, was_dirty); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:725:17 [INFO] [stdout] | [INFO] [stdout] 725 | *(binding.dependencies.as_ptr() as *mut *const u32), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::mark_dependencies_dirty` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:732:13 [INFO] [stdout] | [INFO] [stdout] 732 | mark_dependencies_dirty(binding.dependencies.as_ptr() as *mut DependencyListHead) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1019:17 [INFO] [stdout] | [INFO] [stdout] 1019 | *(value as *mut T) = self.common_property.as_ref().get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1018:13 [INFO] [stdout] | [INFO] [stdout] 1018 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1024:51 [INFO] [stdout] | [INFO] [stdout] 1024 | self.common_property.as_ref().set((*(value as *const T)).clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1023:13 [INFO] [stdout] | [INFO] [stdout] 1023 | unsafe fn intercept_set(self: Pin<&Self>, value: *const ()) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:65:33 [INFO] [stdout] | [INFO] [stdout] 65 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:61:9 [INFO] [stdout] | [INFO] [stdout] 61 | / unsafe fn evaluate T, NF: Fn(&Data, &T), Data>( [INFO] [stdout] 62 | | _self: *mut BindingHolder, [INFO] [stdout] 63 | | _value: *mut (), [INFO] [stdout] 64 | | ) -> BindingResult { [INFO] [stdout] | |__________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:65:53 [INFO] [stdout] | [INFO] [stdout] 65 | let pinned_holder = Pin::new_unchecked(&*_self); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:67:25 [INFO] [stdout] | [INFO] [stdout] 67 | let inner = core::ptr::addr_of_mut!((*_self).binding).as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:67:49 [INFO] [stdout] | [INFO] [stdout] 67 | let inner = core::ptr::addr_of_mut!((*_self).binding).as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:78:29 [INFO] [stdout] | [INFO] [stdout] 78 | core::mem::drop(Box::from_raw( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 79 | | _self as *mut BindingHolder>, [INFO] [stdout] 80 | | )); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | unsafe fn drop(_self: *mut BindingHolder) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/change_tracker.rs:155:21 [INFO] [stdout] | [INFO] [stdout] 155 | let _self = _self.as_ref().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/change_tracker.rs:153:5 [INFO] [stdout] | [INFO] [stdout] 153 | pub(super) unsafe fn mark_dirty(_self: *const BindingHolder, _was_dirty: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:115:32 [INFO] [stdout] | [INFO] [stdout] 115 | let original_binding = Pin::new_unchecked(&self.original_binding); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties/properties_animations.rs:114:5 [INFO] [stdout] | [INFO] [stdout] 114 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:123:17 [INFO] [stdout] | [INFO] [stdout] 123 | *(value as *mut T) = val; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::PropertyHandle::update` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 132 | self.original_binding.update(value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:135:34 [INFO] [stdout] | [INFO] [stdout] 135 | let value = &mut *(value as *mut T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `properties::PropertyHandle::update` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties/properties_animations.rs:140:17 [INFO] [stdout] | [INFO] [stdout] 140 | self.original_binding.update((&mut animation_data.to_value) as *mut T as *mut ()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1329:26 [INFO] [stdout] | [INFO] [stdout] 1329 | let value = &mut *(value as *mut StateInfo); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1327:5 [INFO] [stdout] | [INFO] [stdout] 1327 | unsafe fn evaluate(self: Pin<&Self>, value: *mut ()) -> BindingResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::pin::Pin::::new_unchecked` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1502:17 [INFO] [stdout] | [INFO] [stdout] 1502 | Pin::new_unchecked(&(*(_self as *const BindingHolder)).binding).notify(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> properties.rs:1497:9 [INFO] [stdout] | [INFO] [stdout] 1497 | / unsafe fn mark_dirty( [INFO] [stdout] 1498 | | _self: *const BindingHolder, [INFO] [stdout] 1499 | | was_dirty: bool, [INFO] [stdout] 1500 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereference of raw pointer is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> properties.rs:1502:37 [INFO] [stdout] | [INFO] [stdout] 1502 | Pin::new_unchecked(&(*(_self as *const BindingHolder)).binding).notify(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:35:22 [INFO] [stdout] | [INFO] [stdout] 35 | debug_assert_eq!(inner.as_ref().header.refcount.load(atomic::Ordering::Relaxed), 0); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> sharedvector.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | unsafe fn drop_inner(mut inner: NonNull>) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:36:20 [INFO] [stdout] | [INFO] [stdout] 36 | let data_ptr = inner.as_mut().data.as_mut_ptr(); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:37:17 [INFO] [stdout] | [INFO] [stdout] 37 | for x in 0..inner.as_ref().header.size { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:38:9 [INFO] [stdout] | [INFO] [stdout] 38 | core::ptr::drop_in_place(data_ptr.add(x)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:38:34 [INFO] [stdout] | [INFO] [stdout] 38 | core::ptr::drop_in_place(data_ptr.add(x)); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | / alloc::alloc::dealloc( [INFO] [stdout] 41 | | inner.as_ptr() as *mut u8, [INFO] [stdout] 42 | | compute_inner_layout::(inner.as_ref().header.capacity), [INFO] [stdout] 43 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to unsafe function `std::ptr::NonNull::::as_ref` is unsafe and requires unsafe block (error E0133) [INFO] [stdout] --> sharedvector.rs:42:35 [INFO] [stdout] | [INFO] [stdout] 42 | compute_inner_layout::(inner.as_ref().header.capacity), [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 60 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 11.22s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] error: failed to parse manifest at `/tmp/fixit/Cargo.toml` [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] feature `software-renderer` includes `bytemuck` which is neither a dependency nor another feature [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "c64da168601b649b554ac03ed8018a2342c85d13e6f67f7cb23df033b4231778", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c64da168601b649b554ac03ed8018a2342c85d13e6f67f7cb23df033b4231778", kill_on_drop: false }` [INFO] [stdout] c64da168601b649b554ac03ed8018a2342c85d13e6f67f7cb23df033b4231778