[INFO] cloning repository https://github.com/Brayan-724/hot-reload-rs [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/Brayan-724/hot-reload-rs" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FBrayan-724%2Fhot-reload-rs", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FBrayan-724%2Fhot-reload-rs'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] e7eca89928b0c2b32af69d5f03d405580948c579 [INFO] checking Brayan-724/hot-reload-rs/e7eca89928b0c2b32af69d5f03d405580948c579 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FBrayan-724%2Fhot-reload-rs" "/workspace/builds/worker-0-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-0-tc2/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/Brayan-724/hot-reload-rs on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/Brayan-724/hot-reload-rs [INFO] finished tweaking git repo https://github.com/Brayan-724/hot-reload-rs [INFO] tweaked toml for git repo https://github.com/Brayan-724/hot-reload-rs written to /workspace/builds/worker-0-tc2/source/Cargo.toml [INFO] crate git repo https://github.com/Brayan-724/hot-reload-rs already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 3e99a802820e7a1c4672963841063440f4d9196858538d027ee919eedfb01e55 [INFO] running `Command { std: "docker" "start" "-a" "3e99a802820e7a1c4672963841063440f4d9196858538d027ee919eedfb01e55", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "3e99a802820e7a1c4672963841063440f4d9196858538d027ee919eedfb01e55", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3e99a802820e7a1c4672963841063440f4d9196858538d027ee919eedfb01e55", kill_on_drop: false }` [INFO] [stdout] 3e99a802820e7a1c4672963841063440f4d9196858538d027ee919eedfb01e55 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 1afc2e2750058dcf1da503bac678fc961159f1b60ed493210146b03e9ac75f79 [INFO] running `Command { std: "docker" "start" "-a" "1afc2e2750058dcf1da503bac678fc961159f1b60ed493210146b03e9ac75f79", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating example/Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling libc v0.2.154 [INFO] [stderr] Compiling signal-hook v0.3.17 [INFO] [stderr] Compiling ahash v0.8.11 [INFO] [stderr] Checking zerocopy v0.7.33 [INFO] [stderr] Compiling syn v2.0.60 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Compiling paste v1.0.14 [INFO] [stderr] Checking castaway v0.2.2 [INFO] [stderr] Checking ryu v1.0.17 [INFO] [stderr] Checking bitflags v2.5.0 [INFO] [stderr] Checking either v1.11.0 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking cassowary v0.3.0 [INFO] [stderr] Checking unicode-width v0.1.12 [INFO] [stderr] Checking compact_str v0.7.1 [INFO] [stderr] Checking itertools v0.12.1 [INFO] [stderr] Checking hashbrown v0.14.5 [INFO] [stderr] Checking signal-hook-registry v1.4.2 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking mio v0.8.11 [INFO] [stderr] Checking lru v0.12.3 [INFO] [stderr] Checking parking_lot v0.12.2 [INFO] [stderr] Checking cargo-hot v0.1.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking signal-hook-mio v0.2.3 [INFO] [stderr] Checking crossterm v0.27.0 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `cargo_hot` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/thread.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/thread.rs:23:6 [INFO] [stderr] | [INFO] [stderr] 23 | ($rx:expr_2021; $action:expr_2021) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/thread.rs:23:21 [INFO] [stderr] | [INFO] [stderr] 23 | ($rx:expr_2021; $action:expr_2021) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 2 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/thread.rs:23:10 [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr_2021; $action:expr) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/thread.rs:23:24 [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr_2021) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:205:20 [INFO] [stdout] | [INFO] [stdout] 205 | let Ok(main) = lib.get::(symbol) else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / unsafe fn call_lib_symbol_opt( [INFO] [stdout] 198 | | lib: Arc>>, [INFO] [stdout] 199 | | symbol: &[u8], [INFO] [stdout] 200 | | state: Arc>>, [INFO] [stdout] 201 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:222:16 [INFO] [stdout] | [INFO] [stdout] 222 | let main = lib.get::(symbol).expect(&format!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / unsafe fn call_lib_symbol( [INFO] [stdout] 215 | | lib: Arc>>, [INFO] [stdout] 216 | | symbol: &[u8], [INFO] [stdout] 217 | | state: Arc>>, [INFO] [stdout] 218 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 219 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:209:31 [INFO] [stdout] | [INFO] [stdout] 209 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:300:31 [INFO] [stdout] | [INFO] [stdout] 300 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:294:5 [INFO] [stdout] | [INFO] [stdout] 294 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::array::Channel::::discard_all_messages` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:480:9 [INFO] [stdout] | [INFO] [stdout] 480 | self.discard_all_messages(tail); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:471:5 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn disconnect_receivers(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:68:22 [INFO] [stdout] | [INFO] [stdout] 68 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:123:22 [INFO] [stdout] | [INFO] [stdout] 123 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | unsafe fn destroy(this: *mut Block, start: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:106:14 [INFO] [stdout] | [INFO] [stdout] 106 | drop(Box::from_raw(this)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:262:5 [INFO] [stdout] | [INFO] [stdout] 262 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:272:9 [INFO] [stdout] | [INFO] [stdout] 272 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:366:5 [INFO] [stdout] | [INFO] [stdout] 366 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:382:13 [INFO] [stdout] | [INFO] [stdout] 382 | Block::destroy(block, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:384:13 [INFO] [stdout] | [INFO] [stdout] 384 | Block::destroy(block, offset + 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:114:23 [INFO] [stdout] | [INFO] [stdout] 114 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | packet.msg.get().write(Some(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:127:23 [INFO] [stdout] | [INFO] [stdout] 127 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:121:5 [INFO] [stdout] | [INFO] [stdout] 121 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | drop(Box::from_raw(token.zero.0 as *mut Packet)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `StateWrapper` is never constructed [INFO] [stdout] --> src/main_lib.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | struct StateWrapper(Box); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/watcher/utils.rs:86:16 [INFO] [stdout] | [INFO] [stdout] 86 | if let Some(entry) = self.current.next().and_then(|f| f.ok()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^---------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/watcher/utils.rs:92:13 [INFO] [stdout] | [INFO] [stdout] 92 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 86 ~ match self.current.next().and_then(|f| f.ok()) { Some(entry) => { [INFO] [stdout] 87 | if entry.file_type().ok()?.is_dir() { [INFO] [stdout] ... [INFO] [stdout] 91 | } [INFO] [stdout] 92 ~ } _ => { [INFO] [stdout] 93 | let dir = self.stack.pop()?; [INFO] [stdout] 94 | self.current = fs::read_dir(dir.path()).ok()?; [INFO] [stdout] 95 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/waker.rs:63:12 [INFO] [stdout] | [INFO] [stdout] 63 | if let Some((i, _)) = self [INFO] [stdout] | _____________^ - [INFO] [stdout] | | _______________________________| [INFO] [stdout] 64 | || .selectors [INFO] [stdout] | ||______________________- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] 65 | | .iter() [INFO] [stdout] 66 | | .enumerate() [INFO] [stdout] 67 | | .find(|&(_, entry)| entry.oper == oper) [INFO] [stdout] | |____________________________________________________^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/waker.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 63 ~ match self [INFO] [stdout] 64 | .selectors [INFO] [stdout] ... [INFO] [stdout] 67 | .find(|&(_, entry)| entry.oper == oper) [INFO] [stdout] 68 ~ { Some((i, _)) => { [INFO] [stdout] 69 | let entry = self.selectors.remove(i); [INFO] [stdout] 70 | Some(entry) [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | None [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:152:12 [INFO] [stdout] | [INFO] [stdout] 152 | if let Some(operation) = inner.receivers.try_select() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:159:9 [INFO] [stdout] | [INFO] [stdout] 159 | } else if inner.is_disconnected { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 152 ~ match inner.receivers.try_select() { Some(operation) => { [INFO] [stdout] 153 | token.zero.0 = operation.packet; [INFO] [stdout] ... [INFO] [stdout] 158 | Ok(()) [INFO] [stdout] 159 ~ } _ => if inner.is_disconnected { [INFO] [stdout] 160 | Err(TrySendError::Disconnected(msg)) [INFO] [stdout] 161 | } else { [INFO] [stdout] 162 | Err(TrySendError::Full(msg)) [INFO] [stdout] 163 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:231:12 [INFO] [stdout] | [INFO] [stdout] 231 | if let Some(operation) = inner.senders.try_select() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^-------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:235:9 [INFO] [stdout] | [INFO] [stdout] 235 | } else if inner.is_disconnected { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 231 ~ match inner.senders.try_select() { Some(operation) => { [INFO] [stdout] 232 | token.zero.0 = operation.packet; [INFO] [stdout] 233 | drop(inner); [INFO] [stdout] 234 | unsafe { self.read(token).map_err(|_| TryRecvError::Disconnected) } [INFO] [stdout] 235 ~ } _ => if inner.is_disconnected { [INFO] [stdout] 236 | Err(TryRecvError::Disconnected) [INFO] [stdout] 237 | } else { [INFO] [stdout] 238 | Err(TryRecvError::Empty) [INFO] [stdout] 239 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 35 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `cargo_hot` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/thread.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/thread.rs:23:6 [INFO] [stderr] | [INFO] [stderr] 23 | ($rx:expr_2021; $action:expr_2021) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/thread.rs:23:21 [INFO] [stderr] | [INFO] [stderr] 23 | ($rx:expr_2021; $action:expr_2021) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 2 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/thread.rs:23:10 [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr_2021; $action:expr) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/thread.rs:23:24 [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 23 | ($rx:expr; $action:expr_2021) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:205:20 [INFO] [stdout] | [INFO] [stdout] 205 | let Ok(main) = lib.get::(symbol) else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / unsafe fn call_lib_symbol_opt( [INFO] [stdout] 198 | | lib: Arc>>, [INFO] [stdout] 199 | | symbol: &[u8], [INFO] [stdout] 200 | | state: Arc>>, [INFO] [stdout] 201 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:222:16 [INFO] [stdout] | [INFO] [stdout] 222 | let main = lib.get::(symbol).expect(&format!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / unsafe fn call_lib_symbol( [INFO] [stdout] 215 | | lib: Arc>>, [INFO] [stdout] 216 | | symbol: &[u8], [INFO] [stdout] 217 | | state: Arc>>, [INFO] [stdout] 218 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 219 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:209:31 [INFO] [stdout] | [INFO] [stdout] 209 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:300:31 [INFO] [stdout] | [INFO] [stdout] 300 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:294:5 [INFO] [stdout] | [INFO] [stdout] 294 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::array::Channel::::discard_all_messages` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:480:9 [INFO] [stdout] | [INFO] [stdout] 480 | self.discard_all_messages(tail); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:471:5 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn disconnect_receivers(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:68:22 [INFO] [stdout] | [INFO] [stdout] 68 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:123:22 [INFO] [stdout] | [INFO] [stdout] 123 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | unsafe fn destroy(this: *mut Block, start: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:106:14 [INFO] [stdout] | [INFO] [stdout] 106 | drop(Box::from_raw(this)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:262:5 [INFO] [stdout] | [INFO] [stdout] 262 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:272:9 [INFO] [stdout] | [INFO] [stdout] 272 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:366:5 [INFO] [stdout] | [INFO] [stdout] 366 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:382:13 [INFO] [stdout] | [INFO] [stdout] 382 | Block::destroy(block, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:384:13 [INFO] [stdout] | [INFO] [stdout] 384 | Block::destroy(block, offset + 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:114:23 [INFO] [stdout] | [INFO] [stdout] 114 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | packet.msg.get().write(Some(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:127:23 [INFO] [stdout] | [INFO] [stdout] 127 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:121:5 [INFO] [stdout] | [INFO] [stdout] 121 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | drop(Box::from_raw(token.zero.0 as *mut Packet)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `StateWrapper` is never constructed [INFO] [stdout] --> src/main_lib.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | struct StateWrapper(Box); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/watcher/utils.rs:86:16 [INFO] [stdout] | [INFO] [stdout] 86 | if let Some(entry) = self.current.next().and_then(|f| f.ok()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^---------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/watcher/utils.rs:92:13 [INFO] [stdout] | [INFO] [stdout] 92 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 86 ~ match self.current.next().and_then(|f| f.ok()) { Some(entry) => { [INFO] [stdout] 87 | if entry.file_type().ok()?.is_dir() { [INFO] [stdout] ... [INFO] [stdout] 91 | } [INFO] [stdout] 92 ~ } _ => { [INFO] [stdout] 93 | let dir = self.stack.pop()?; [INFO] [stdout] 94 | self.current = fs::read_dir(dir.path()).ok()?; [INFO] [stdout] 95 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/waker.rs:63:12 [INFO] [stdout] | [INFO] [stdout] 63 | if let Some((i, _)) = self [INFO] [stdout] | _____________^ - [INFO] [stdout] | | _______________________________| [INFO] [stdout] 64 | || .selectors [INFO] [stdout] | ||______________________- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] 65 | | .iter() [INFO] [stdout] 66 | | .enumerate() [INFO] [stdout] 67 | | .find(|&(_, entry)| entry.oper == oper) [INFO] [stdout] | |____________________________________________________^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/waker.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 63 ~ match self [INFO] [stdout] 64 | .selectors [INFO] [stdout] ... [INFO] [stdout] 67 | .find(|&(_, entry)| entry.oper == oper) [INFO] [stdout] 68 ~ { Some((i, _)) => { [INFO] [stdout] 69 | let entry = self.selectors.remove(i); [INFO] [stdout] 70 | Some(entry) [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | None [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:152:12 [INFO] [stdout] | [INFO] [stdout] 152 | if let Some(operation) = inner.receivers.try_select() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:159:9 [INFO] [stdout] | [INFO] [stdout] 159 | } else if inner.is_disconnected { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 152 ~ match inner.receivers.try_select() { Some(operation) => { [INFO] [stdout] 153 | token.zero.0 = operation.packet; [INFO] [stdout] ... [INFO] [stdout] 158 | Ok(()) [INFO] [stdout] 159 ~ } _ => if inner.is_disconnected { [INFO] [stdout] 160 | Err(TrySendError::Disconnected(msg)) [INFO] [stdout] 161 | } else { [INFO] [stdout] 162 | Err(TrySendError::Full(msg)) [INFO] [stdout] 163 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:231:12 [INFO] [stdout] | [INFO] [stdout] 231 | if let Some(operation) = inner.senders.try_select() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^-------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/mpmc/zero.rs:235:9 [INFO] [stdout] | [INFO] [stdout] 235 | } else if inner.is_disconnected { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 231 ~ match inner.senders.try_select() { Some(operation) => { [INFO] [stdout] 232 | token.zero.0 = operation.packet; [INFO] [stdout] 233 | drop(inner); [INFO] [stdout] 234 | unsafe { self.read(token).map_err(|_| TryRecvError::Disconnected) } [INFO] [stdout] 235 ~ } _ => if inner.is_disconnected { [INFO] [stdout] 236 | Err(TryRecvError::Disconnected) [INFO] [stdout] 237 | } else { [INFO] [stdout] 238 | Err(TryRecvError::Empty) [INFO] [stdout] 239 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 35 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating src/main.rs from 2021 edition to 2024 [INFO] [stdout] warning: unreachable expression [INFO] [stdout] --> src/main.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 17 | / loop { [INFO] [stdout] 18 | | unsafe { [INFO] [stdout] 19 | | let main = lib [INFO] [stdout] 20 | | .get:: *mut u32>(b"hot_main") [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____- any code following this expression is unreachable [INFO] [stdout] 28 | [INFO] [stdout] 29 | / unsafe { [INFO] [stdout] 30 | | let drop_ = lib [INFO] [stdout] 31 | | .get::(b"hot_drop") [INFO] [stdout] 32 | | .expect("Should have 'hot_main' function public"); [INFO] [stdout] 33 | | let drop_ = drop_(state); [INFO] [stdout] 34 | | println!("{drop_:#?}"); [INFO] [stdout] 35 | | } [INFO] [stdout] | |_____^ unreachable expression [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unreachable_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable expression [INFO] [stdout] --> src/main.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 17 | / loop { [INFO] [stdout] 18 | | unsafe { [INFO] [stdout] 19 | | let main = lib [INFO] [stdout] 20 | | .get:: *mut u32>(b"hot_main") [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____- any code following this expression is unreachable [INFO] [stdout] 28 | [INFO] [stdout] 29 | / unsafe { [INFO] [stdout] 30 | | let drop_ = lib [INFO] [stdout] 31 | | .get::(b"hot_drop") [INFO] [stdout] 32 | | .expect("Should have 'hot_main' function public"); [INFO] [stdout] 33 | | let drop_ = drop_(state); [INFO] [stdout] 34 | | println!("{drop_:#?}"); [INFO] [stdout] 35 | | } [INFO] [stdout] | |_____^ unreachable expression [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unreachable_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling strum_macros v0.26.2 [INFO] [stderr] Compiling stability v0.2.0 [INFO] [stderr] Checking strum v0.26.2 [INFO] [stderr] Checking ratatui v0.26.2 [INFO] [stderr] Checking example v0.1.0 (/tmp/fixit/example) [INFO] [stderr] Migrating example/src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Migrating example/src/main.rs from 2021 edition to 2024 [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.42s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking cargo-hot v0.1.0 (/tmp/fixit) [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:205:20 [INFO] [stdout] | [INFO] [stdout] 205 | let Ok(main) = lib.get::(symbol) else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / unsafe fn call_lib_symbol_opt( [INFO] [stdout] 198 | | lib: Arc>>, [INFO] [stdout] 199 | | symbol: &[u8], [INFO] [stdout] 200 | | state: Arc>>, [INFO] [stdout] 201 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:205:20 [INFO] [stdout] | [INFO] [stdout] 205 | let Ok(main) = lib.get::(symbol) else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / unsafe fn call_lib_symbol_opt( [INFO] [stdout] 198 | | lib: Arc>>, [INFO] [stdout] 199 | | symbol: &[u8], [INFO] [stdout] 200 | | state: Arc>>, [INFO] [stdout] 201 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:222:16 [INFO] [stdout] | [INFO] [stdout] 222 | let main = lib.get::(symbol).expect(&format!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / unsafe fn call_lib_symbol( [INFO] [stdout] 215 | | lib: Arc>>, [INFO] [stdout] 216 | | symbol: &[u8], [INFO] [stdout] 217 | | state: Arc>>, [INFO] [stdout] 218 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 219 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/main_lib.rs:222:16 [INFO] [stdout] | [INFO] [stdout] 222 | let main = lib.get::(symbol).expect(&format!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/main_lib.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / unsafe fn call_lib_symbol( [INFO] [stdout] 215 | | lib: Arc>>, [INFO] [stdout] 216 | | symbol: &[u8], [INFO] [stdout] 217 | | state: Arc>>, [INFO] [stdout] 218 | | fun: impl Fn(libloading::Symbol<'_, T>, StateLib) -> Option, [INFO] [stdout] 219 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:209:31 [INFO] [stdout] | [INFO] [stdout] 209 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:209:31 [INFO] [stdout] | [INFO] [stdout] 209 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:300:31 [INFO] [stdout] | [INFO] [stdout] 300 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:294:5 [INFO] [stdout] | [INFO] [stdout] 294 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:300:31 [INFO] [stdout] | [INFO] [stdout] 300 | let slot: &Slot = &*(token.array.slot as *const Slot); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:294:5 [INFO] [stdout] | [INFO] [stdout] 294 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:303:19 [INFO] [stdout] | [INFO] [stdout] 303 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::array::Channel::::discard_all_messages` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:480:9 [INFO] [stdout] | [INFO] [stdout] 480 | self.discard_all_messages(tail); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:471:5 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn disconnect_receivers(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::array::Channel::::discard_all_messages` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/array.rs:480:9 [INFO] [stdout] | [INFO] [stdout] 480 | self.discard_all_messages(tail); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/array.rs:471:5 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn disconnect_receivers(&self) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:68:22 [INFO] [stdout] | [INFO] [stdout] 68 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:68:22 [INFO] [stdout] | [INFO] [stdout] 68 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:123:22 [INFO] [stdout] | [INFO] [stdout] 123 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/counter.rs:123:22 [INFO] [stdout] | [INFO] [stdout] 123 | drop(Box::from_raw(self.counter)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/counter.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | pub(crate) unsafe fn release bool>(&self, disconnect: F) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | unsafe fn destroy(this: *mut Block, start: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:106:14 [INFO] [stdout] | [INFO] [stdout] 106 | drop(Box::from_raw(this)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | unsafe fn destroy(this: *mut Block, start: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:94:24 [INFO] [stdout] | [INFO] [stdout] 94 | let slot = (*this).slots.get_unchecked(i); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:106:14 [INFO] [stdout] | [INFO] [stdout] 106 | drop(Box::from_raw(this)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:262:5 [INFO] [stdout] | [INFO] [stdout] 262 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:272:9 [INFO] [stdout] | [INFO] [stdout] 272 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:262:5 [INFO] [stdout] | [INFO] [stdout] 262 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:271:20 [INFO] [stdout] | [INFO] [stdout] 271 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:272:9 [INFO] [stdout] | [INFO] [stdout] 272 | slot.msg.get().write(MaybeUninit::new(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:366:5 [INFO] [stdout] | [INFO] [stdout] 366 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:382:13 [INFO] [stdout] | [INFO] [stdout] 382 | Block::destroy(block, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:384:13 [INFO] [stdout] | [INFO] [stdout] 384 | Block::destroy(block, offset + 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::::get_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/list.rs:366:5 [INFO] [stdout] | [INFO] [stdout] 366 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let slot = (*block).slots.get_unchecked(offset); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:377:19 [INFO] [stdout] | [INFO] [stdout] 377 | let msg = slot.msg.get().read().assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:382:13 [INFO] [stdout] | [INFO] [stdout] 382 | Block::destroy(block, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `mpmc::list::Block::::destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/list.rs:384:13 [INFO] [stdout] | [INFO] [stdout] 384 | Block::destroy(block, offset + 1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:114:23 [INFO] [stdout] | [INFO] [stdout] 114 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | packet.msg.get().write(Some(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:127:23 [INFO] [stdout] | [INFO] [stdout] 127 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:121:5 [INFO] [stdout] | [INFO] [stdout] 121 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | drop(Box::from_raw(token.zero.0 as *mut Packet)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:114:23 [INFO] [stdout] | [INFO] [stdout] 114 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:108:5 [INFO] [stdout] | [INFO] [stdout] 108 | pub(crate) unsafe fn write(&self, token: &mut Token, msg: T) -> Result<(), T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:115:9 [INFO] [stdout] | [INFO] [stdout] 115 | packet.msg.get().write(Some(msg)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:127:23 [INFO] [stdout] | [INFO] [stdout] 127 | let packet = &*(token.zero.0 as *const Packet); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/mpmc/zero.rs:121:5 [INFO] [stdout] | [INFO] [stdout] 121 | pub(crate) unsafe fn read(&self, token: &mut Token) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::replace` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let msg = packet.msg.get().replace(None).unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/mpmc/zero.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | drop(Box::from_raw(token.zero.0 as *mut Packet)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `StateWrapper` is never constructed [INFO] [stdout] --> src/main_lib.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | struct StateWrapper(Box); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `StateWrapper` is never constructed [INFO] [stdout] --> src/main_lib.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | struct StateWrapper(Box); [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 29 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning: 29 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Checking example v0.1.0 (/tmp/fixit/example) [INFO] [stdout] warning: unreachable expression [INFO] [stdout] --> src/main.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 17 | / loop { [INFO] [stdout] 18 | | unsafe { [INFO] [stdout] 19 | | let main = lib [INFO] [stdout] 20 | | .get:: *mut u32>(b"hot_main") [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____- any code following this expression is unreachable [INFO] [stdout] 28 | [INFO] [stdout] 29 | / unsafe { [INFO] [stdout] 30 | | let drop_ = lib [INFO] [stdout] 31 | | .get::(b"hot_drop") [INFO] [stdout] 32 | | .expect("Should have 'hot_main' function public"); [INFO] [stdout] 33 | | let drop_ = drop_(state); [INFO] [stdout] 34 | | println!("{drop_:#?}"); [INFO] [stdout] 35 | | } [INFO] [stdout] | |_____^ unreachable expression [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unreachable_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unreachable expression [INFO] [stdout] --> src/main.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 17 | / loop { [INFO] [stdout] 18 | | unsafe { [INFO] [stdout] 19 | | let main = lib [INFO] [stdout] 20 | | .get:: *mut u32>(b"hot_main") [INFO] [stdout] ... | [INFO] [stdout] 26 | | } [INFO] [stdout] 27 | | } [INFO] [stdout] | |_____- any code following this expression is unreachable [INFO] [stdout] 28 | [INFO] [stdout] 29 | / unsafe { [INFO] [stdout] 30 | | let drop_ = lib [INFO] [stdout] 31 | | .get::(b"hot_drop") [INFO] [stdout] 32 | | .expect("Should have 'hot_main' function public"); [INFO] [stdout] 33 | | let drop_ = drop_(state); [INFO] [stdout] 34 | | println!("{drop_:#?}"); [INFO] [stdout] 35 | | } [INFO] [stdout] | |_____^ unreachable expression [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unreachable_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:20:11 [INFO] [stdout] | [INFO] [stdout] 20 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:20:11 [INFO] [stdout] | [INFO] [stdout] 20 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:25:11 [INFO] [stdout] | [INFO] [stdout] 25 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:25:11 [INFO] [stdout] | [INFO] [stdout] 25 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:33:11 [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:33:11 [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:45:11 [INFO] [stdout] | [INFO] [stdout] 45 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:45:11 [INFO] [stdout] | [INFO] [stdout] 45 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:58:11 [INFO] [stdout] | [INFO] [stdout] 58 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> example/src/lib.rs:110:1 [INFO] [stdout] | [INFO] [stdout] 110 | / hot_lib! { [INFO] [stdout] 111 | | State; [INFO] [stdout] 112 | | init => lib_init; [INFO] [stdout] 113 | | main => lib_main; [INFO] [stdout] 114 | | post_main => lib_post_main; [INFO] [stdout] 115 | | drop => lib_drop; [INFO] [stdout] 116 | | } [INFO] [stdout] | |_^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = note: this error originates in the macro `hot_lib` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] --> /tmp/fixit/src/lib.rs:58:11 [INFO] [stdout] | [INFO] [stdout] 58 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 5 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 5 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `example` (lib) due to 6 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stderr] error: could not compile `example` (lib test) due to 6 previous errors [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "1afc2e2750058dcf1da503bac678fc961159f1b60ed493210146b03e9ac75f79", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1afc2e2750058dcf1da503bac678fc961159f1b60ed493210146b03e9ac75f79", kill_on_drop: false }` [INFO] [stdout] 1afc2e2750058dcf1da503bac678fc961159f1b60ed493210146b03e9ac75f79