[INFO] cloning repository https://github.com/Huzhiwen1208/polyhal-with-libos [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/Huzhiwen1208/polyhal-with-libos" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FHuzhiwen1208%2Fpolyhal-with-libos", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FHuzhiwen1208%2Fpolyhal-with-libos'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] cca729bfea14cc816c03567d9e49fcacd15e430f [INFO] checking Huzhiwen1208/polyhal-with-libos/cca729bfea14cc816c03567d9e49fcacd15e430f against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FHuzhiwen1208%2Fpolyhal-with-libos" "/workspace/builds/worker-0-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-0-tc2/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/Huzhiwen1208/polyhal-with-libos on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] removed /workspace/builds/worker-0-tc2/source/.cargo/config.toml [INFO] removed /workspace/builds/worker-0-tc2/source/rust-toolchain.toml [INFO] started tweaking git repo https://github.com/Huzhiwen1208/polyhal-with-libos [INFO] finished tweaking git repo https://github.com/Huzhiwen1208/polyhal-with-libos [INFO] tweaked toml for git repo https://github.com/Huzhiwen1208/polyhal-with-libos written to /workspace/builds/worker-0-tc2/source/Cargo.toml [INFO] crate git repo https://github.com/Huzhiwen1208/polyhal-with-libos already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 09fb50a36bf60cd04346ed5cd74f42370f1eaf056da0dfadbe4ecd769be48f12 [INFO] running `Command { std: "docker" "start" "-a" "09fb50a36bf60cd04346ed5cd74f42370f1eaf056da0dfadbe4ecd769be48f12", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "09fb50a36bf60cd04346ed5cd74f42370f1eaf056da0dfadbe4ecd769be48f12", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "09fb50a36bf60cd04346ed5cd74f42370f1eaf056da0dfadbe4ecd769be48f12", kill_on_drop: false }` [INFO] [stdout] 09fb50a36bf60cd04346ed5cd74f42370f1eaf056da0dfadbe4ecd769be48f12 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d669517bb08f0bff4ed38ece9a24a757330d99d33d0c4e8e5ddcdfe6ac3af02d [INFO] running `Command { std: "docker" "start" "-a" "d669517bb08f0bff4ed38ece9a24a757330d99d33d0c4e8e5ddcdfe6ac3af02d", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling proc-macro2 v1.0.79 [INFO] [stderr] Compiling autocfg v1.2.0 [INFO] [stderr] Compiling rustversion v1.0.15 [INFO] [stderr] Checking bit_field v0.10.2 [INFO] [stderr] Checking bitflags v2.5.0 [INFO] [stderr] Compiling x86 v0.52.0 [INFO] [stderr] Checking volatile v0.4.6 [INFO] [stderr] Compiling percpu v0.1.0 (https://github.com/Byte-OS/percpu.git#a71e60e3) [INFO] [stderr] Checking bit v0.1.1 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking fdt v0.1.5 [INFO] [stderr] Checking raw-cpuid v10.7.0 [INFO] [stderr] Checking multiboot v0.8.0 [INFO] [stderr] Checking raw-cpuid v11.0.1 [INFO] [stderr] Compiling lock_api v0.4.11 [INFO] [stderr] Checking spin v0.9.8 [INFO] [stderr] Compiling quote v1.0.35 [INFO] [stderr] Checking x86_64 v0.14.12 [INFO] [stderr] Checking irq_safety v0.1.1 (https://github.com/theseus-os/irq_safety.git#11bfab9f) [INFO] [stderr] Compiling syn v2.0.58 [INFO] [stderr] Checking x2apic v0.4.3 [INFO] [stderr] Compiling percpu_macros v0.1.0 (https://github.com/Byte-OS/percpu.git#a71e60e3) [INFO] [stderr] Compiling polyhal-macro v0.1.0 (/tmp/fixit/polyhal-macro) [INFO] [stderr] Checking polyhal v0.1.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `polyhal` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/addr.rs [INFO] [stderr] * src/consts.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/x86_64/interrupt.rs [INFO] [stderr] * src/x86_64/multiboot.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/consts.rs:18:6 [INFO] [stderr] | [INFO] [stderr] 18 | ($x:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:46:3 [INFO] [stderr] | [INFO] [stderr] 46 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:50:3 [INFO] [stderr] | [INFO] [stderr] 50 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:54:3 [INFO] [stderr] | [INFO] [stderr] 54 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] error[E0425]: cannot find value `USER_CONTEXT` in this scope [INFO] [stderr] --> src/x86_64/interrupt.rs:385:5 [INFO] [stderr] | [INFO] [stderr] 385 | USER_CONTEXT.write_current(cx_general_top); [INFO] [stderr] | ^^^^^^^^^^^^ not found in this scope [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `c906` [INFO] [stderr] --> src/addr.rs:214:15 [INFO] [stderr] | [INFO] [stderr] 214 | #[cfg(c906)] [INFO] [stderr] | ^^^^ [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:46:3 [INFO] [stdout] | [INFO] [stdout] 46 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 46 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:74:3 [INFO] [stdout] | [INFO] [stdout] 74 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 74 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `board` [INFO] [stderr] --> src/addr.rs:219:15 [INFO] [stderr] | [INFO] [stderr] 219 | #[cfg(board = "2k1000")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `board` [INFO] [stderr] --> src/addr.rs:235:15 [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:115:3 [INFO] [stdout] | [INFO] [stdout] 115 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 115 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:165:3 [INFO] [stdout] | [INFO] [stdout] 165 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 165 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 235 | #[cfg(board = "2k1000")] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:212:3 [INFO] [stdout] | [INFO] [stdout] 212 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 212 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:9:3 [INFO] [stdout] | [INFO] [stdout] 9 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 9 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:10:3 [INFO] [stdout] | [INFO] [stdout] 10 | #[link_section = ".sigtrx.sigreturn"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 10 | #[unsafe(link_section = ".sigtrx.sigreturn")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:23:3 [INFO] [stdout] | [INFO] [stdout] 23 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 23 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:26:3 [INFO] [stdout] | [INFO] [stdout] 26 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 26 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [lints.rust] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[link_section = ".bss.stack"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(link_section = ".bss.stack")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:214:15 [INFO] [stdout] | [INFO] [stdout] 214 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:219:15 [INFO] [stdout] | [INFO] [stdout] 219 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `c906` [INFO] [stderr] --> src/addr.rs:239:15 [INFO] [stderr] | [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 239 | #[cfg(c906)] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:239:15 [INFO] [stdout] | [INFO] [stdout] 239 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^ [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/api.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | extern "Rust" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 5 | | pub(crate) fn _main_for_arch(hartid: usize); [INFO] [stdout] 6 | | pub(crate) fn _interrupt_for_arch(ctx: &mut TrapFrame, trap_type: TrapType); [INFO] [stdout] 7 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/consts.rs:18:9 [INFO] [stdout] | [INFO] [stdout] 18 | ($x:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($x:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/idt.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 18 | | #[link_name = "trap_handler_table"] [INFO] [stdout] 19 | | static ENTRIES: [extern "C" fn(); NUM_INT]; [INFO] [stdout] 20 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/multiboot.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 78 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _____help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 79 | | fn _kernel_page_table(); [INFO] [stdout] 80 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/page_table.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 135 | | fn _kernel_mapping_pdpt(); [INFO] [stdout] 136 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/lib.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _____help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 231 | | fn _sbss(); [INFO] [stdout] 232 | | fn _ebss(); [INFO] [stdout] 233 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/lib.rs:4:12 [INFO] [stdout] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | #![feature(asm_const)] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:6:12 [INFO] [stdout] | [INFO] [stdout] 6 | #![feature(const_mut_refs)] [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 4 | #![feature(asm_const)] [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/x86_64/multiboot.rs:58:45 [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stdout] | ^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stdout] | ~~~~~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(stable_features)]` on by default [INFO] [stderr] [INFO] [stderr] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:6:12 [INFO] [stderr] | [INFO] [stderr] 6 | #![feature(const_mut_refs)] [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: creating a mutable reference to mutable static is discouraged [INFO] [stderr] --> src/x86_64/multiboot.rs:58:45 [INFO] [stderr] | [INFO] [stderr] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stderr] | ^^^^^^^^ mutable reference to mutable static [INFO] [stderr] | [INFO] [stderr] = note: for more information, see issue #114447 [INFO] [stderr] = note: this will be a hard error in the 2024 edition [INFO] [stderr] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stderr] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stderr] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stderr] | [INFO] [stderr] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stderr] | ~~~~~~~~~~~~~ + [INFO] [stderr] [INFO] [stderr] error: aborting due to 5 previous errors; 7 warnings emitted [INFO] [stderr] [INFO] [stderr] Some errors have detailed explanations: E0425, E0658. [INFO] [stderr] For more information about an error, try `rustc --explain E0425`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:10 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn get_unchecked(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:11 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:14 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe fn get_mut_unchecked(&mut self) -> &mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:15 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::lgdt` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:74:9 [INFO] [stdout] | [INFO] [stdout] 74 | lgdt(&self.pointer()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn load(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::segmentation::Segment::set_reg` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:75:9 [INFO] [stdout] | [INFO] [stdout] 75 | CS::set_reg(Self::KCODE64_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::load_tss` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:85:9 [INFO] [stdout] | [INFO] [stdout] 85 | load_tss(Self::TSS_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn load_tss(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:117:5 [INFO] [stdout] | [INFO] [stdout] 117 | / asm!( [INFO] [stdout] 118 | | r" [INFO] [stdout] 119 | | sub rsp, 16 # push fs_base, gs_base [INFO] [stdout] ... | [INFO] [stdout] 160 | | options(noreturn) [INFO] [stdout] 161 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:116:1 [INFO] [stdout] | [INFO] [stdout] 116 | pub unsafe extern "C" fn kernelvec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:167:5 [INFO] [stdout] | [INFO] [stdout] 167 | / asm!( [INFO] [stdout] 168 | | r" [INFO] [stdout] 169 | | sub rsp, 16 [INFO] [stdout] ... | [INFO] [stdout] 207 | | options(noreturn) [INFO] [stdout] 208 | | ); [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | pub unsafe extern "C" fn uservec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:279:5 [INFO] [stdout] | [INFO] [stdout] 279 | / asm!( [INFO] [stdout] 280 | | " [INFO] [stdout] 281 | | pop rcx [INFO] [stdout] 282 | | add rsp, 8 [INFO] [stdout] ... | [INFO] [stdout] 289 | | options(noreturn) [INFO] [stdout] 290 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:278:1 [INFO] [stdout] | [INFO] [stdout] 278 | unsafe extern "C" fn sysretq() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:319:5 [INFO] [stdout] | [INFO] [stdout] 319 | / asm!( [INFO] [stdout] 320 | | r" [INFO] [stdout] 321 | | swapgs [INFO] [stdout] 322 | | mov gs:[offset __PERCPU_USER_RSP], rsp [INFO] [stdout] ... | [INFO] [stdout] 375 | | options(noreturn) [INFO] [stdout] 376 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:318:1 [INFO] [stdout] | [INFO] [stdout] 318 | unsafe extern "C" fn syscall_entry() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:39:19 [INFO] [stdout] | [INFO] [stdout] 39 | let ptr = mem::transmute(addr | VIRT_ADDR_START as u64); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/multiboot.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | unsafe fn paddr_to_slice(&self, addr: PAddr, size: usize) -> Option<&'static [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | Some(slice::from_raw_parts(ptr, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/sigtrx.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | / core::arch::asm!( [INFO] [stdout] 13 | | // 1. 设置栈信息 [INFO] [stdout] 14 | | // sp = bootstack + (hartid + 1) * 0x10000 [INFO] [stdout] 15 | | " [INFO] [stdout] ... | [INFO] [stdout] 19 | | options(noreturn) [INFO] [stdout] 20 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/sigtrx.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | unsafe extern "C" fn _sigreturn() -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/x86_64/mod.rs:103:8 [INFO] [stdout] | [INFO] [stdout] 103 | if let Some(mboot) = use_multiboot(*MBOOT_PTR as _) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^---------^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/x86_64/mod.rs:124:5 [INFO] [stdout] | [INFO] [stdout] 124 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 103 ~ match use_multiboot(*MBOOT_PTR as _) { Some(mboot) => { [INFO] [stdout] 104 | mboot [INFO] [stdout] ... [INFO] [stdout] 123 | MEM_AREA.init_by(mem_area); [INFO] [stdout] 124 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 40 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `polyhal` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/addr.rs [INFO] [stderr] * src/consts.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/x86_64/interrupt.rs [INFO] [stderr] * src/x86_64/multiboot.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/consts.rs:18:6 [INFO] [stderr] | [INFO] [stderr] 18 | ($x:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:46:3 [INFO] [stderr] | [INFO] [stderr] 46 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:50:3 [INFO] [stderr] | [INFO] [stderr] 50 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stderr] error: expected identifier, found keyword `unsafe` [INFO] [stderr] --> src/x86_64/interrupt.rs:54:3 [INFO] [stderr] | [INFO] [stderr] 54 | #[unsafe(no_mangle)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:46:3 [INFO] [stdout] | [INFO] [stdout] 46 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 46 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error[E0425]: cannot find value `USER_CONTEXT` in this scope [INFO] [stderr] --> src/x86_64/interrupt.rs:385:5 [INFO] [stderr] | [INFO] [stderr] 385 | USER_CONTEXT.write_current(cx_general_top); [INFO] [stderr] | ^^^^^^^^^^^^ not found in this scope [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `c906` [INFO] [stderr] --> src/addr.rs:214:15 [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 214 | #[cfg(c906)] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^ [INFO] [stderr] | [INFO] [stderr] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `board` [INFO] [stderr] --> src/addr.rs:219:15 [INFO] [stderr] | [INFO] [stderr] 219 | #[cfg(board = "2k1000")] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:74:3 [INFO] [stdout] | [INFO] [stdout] 74 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 74 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `board` [INFO] [stderr] --> src/addr.rs:235:15 [INFO] [stderr] | [INFO] [stderr] 235 | #[cfg(board = "2k1000")] [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:115:3 [INFO] [stdout] | [INFO] [stdout] 115 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 115 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `c906` [INFO] [stderr] --> src/addr.rs:239:15 [INFO] [stderr] | [INFO] [stderr] 239 | #[cfg(c906)] [INFO] [stderr] | ^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:4:12 [INFO] [stderr] | [INFO] [stderr] 4 | #![feature(asm_const)] [INFO] [stderr] | ^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(stable_features)]` on by default [INFO] [stderr] [INFO] [stderr] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:6:12 [INFO] [stderr] | [INFO] [stderr] 6 | #![feature(const_mut_refs)] [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: creating a mutable reference to mutable static is discouraged [INFO] [stderr] --> src/x86_64/multiboot.rs:58:45 [INFO] [stderr] | [INFO] [stderr] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stderr] | ^^^^^^^^ mutable reference to mutable static [INFO] [stderr] | [INFO] [stderr] = note: for more information, see issue #114447 [INFO] [stderr] = note: this will be a hard error in the 2024 edition [INFO] [stderr] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stderr] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stderr] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stderr] | [INFO] [stderr] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stderr] | ~~~~~~~~~~~~~ + [INFO] [stderr] [INFO] [stderr] error: aborting due to 5 previous errors; 7 warnings emitted [INFO] [stderr] [INFO] [stderr] Some errors have detailed explanations: E0425, E0658. [INFO] [stderr] For more information about an error, try `rustc --explain E0425`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:165:3 [INFO] [stdout] | [INFO] [stdout] 165 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 165 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:212:3 [INFO] [stdout] | [INFO] [stdout] 212 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 212 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:9:3 [INFO] [stdout] | [INFO] [stdout] 9 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 9 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:10:3 [INFO] [stdout] | [INFO] [stdout] 10 | #[link_section = ".sigtrx.sigreturn"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 10 | #[unsafe(link_section = ".sigtrx.sigreturn")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:23:3 [INFO] [stdout] | [INFO] [stdout] 23 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 23 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:26:3 [INFO] [stdout] | [INFO] [stdout] 26 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 26 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[link_section = ".bss.stack"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(link_section = ".bss.stack")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:214:15 [INFO] [stdout] | [INFO] [stdout] 214 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:219:15 [INFO] [stdout] | [INFO] [stdout] 219 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:239:15 [INFO] [stdout] | [INFO] [stdout] 239 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/api.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | extern "Rust" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 5 | | pub(crate) fn _main_for_arch(hartid: usize); [INFO] [stdout] 6 | | pub(crate) fn _interrupt_for_arch(ctx: &mut TrapFrame, trap_type: TrapType); [INFO] [stdout] 7 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/consts.rs:18:9 [INFO] [stdout] | [INFO] [stdout] 18 | ($x:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($x:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/idt.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 18 | | #[link_name = "trap_handler_table"] [INFO] [stdout] 19 | | static ENTRIES: [extern "C" fn(); NUM_INT]; [INFO] [stdout] 20 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/multiboot.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 78 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _____help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 79 | | fn _kernel_page_table(); [INFO] [stdout] 80 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/x86_64/page_table.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 135 | | fn _kernel_mapping_pdpt(); [INFO] [stdout] 136 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/lib.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _____help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 231 | | fn _sbss(); [INFO] [stdout] 232 | | fn _ebss(); [INFO] [stdout] 233 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | #![feature(asm_const)] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:6:12 [INFO] [stdout] | [INFO] [stdout] 6 | #![feature(const_mut_refs)] [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/x86_64/multiboot.rs:58:45 [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stdout] | ^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stdout] | ~~~~~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:10 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn get_unchecked(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:11 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:14 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe fn get_mut_unchecked(&mut self) -> &mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:15 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::lgdt` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:74:9 [INFO] [stdout] | [INFO] [stdout] 74 | lgdt(&self.pointer()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn load(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::segmentation::Segment::set_reg` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:75:9 [INFO] [stdout] | [INFO] [stdout] 75 | CS::set_reg(Self::KCODE64_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::load_tss` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:85:9 [INFO] [stdout] | [INFO] [stdout] 85 | load_tss(Self::TSS_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn load_tss(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:117:5 [INFO] [stdout] | [INFO] [stdout] 117 | / asm!( [INFO] [stdout] 118 | | r" [INFO] [stdout] 119 | | sub rsp, 16 # push fs_base, gs_base [INFO] [stdout] ... | [INFO] [stdout] 160 | | options(noreturn) [INFO] [stdout] 161 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:116:1 [INFO] [stdout] | [INFO] [stdout] 116 | pub unsafe extern "C" fn kernelvec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:167:5 [INFO] [stdout] | [INFO] [stdout] 167 | / asm!( [INFO] [stdout] 168 | | r" [INFO] [stdout] 169 | | sub rsp, 16 [INFO] [stdout] ... | [INFO] [stdout] 207 | | options(noreturn) [INFO] [stdout] 208 | | ); [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | pub unsafe extern "C" fn uservec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:279:5 [INFO] [stdout] | [INFO] [stdout] 279 | / asm!( [INFO] [stdout] 280 | | " [INFO] [stdout] 281 | | pop rcx [INFO] [stdout] 282 | | add rsp, 8 [INFO] [stdout] ... | [INFO] [stdout] 289 | | options(noreturn) [INFO] [stdout] 290 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:278:1 [INFO] [stdout] | [INFO] [stdout] 278 | unsafe extern "C" fn sysretq() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:319:5 [INFO] [stdout] | [INFO] [stdout] 319 | / asm!( [INFO] [stdout] 320 | | r" [INFO] [stdout] 321 | | swapgs [INFO] [stdout] 322 | | mov gs:[offset __PERCPU_USER_RSP], rsp [INFO] [stdout] ... | [INFO] [stdout] 375 | | options(noreturn) [INFO] [stdout] 376 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:318:1 [INFO] [stdout] | [INFO] [stdout] 318 | unsafe extern "C" fn syscall_entry() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:39:19 [INFO] [stdout] | [INFO] [stdout] 39 | let ptr = mem::transmute(addr | VIRT_ADDR_START as u64); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/multiboot.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | unsafe fn paddr_to_slice(&self, addr: PAddr, size: usize) -> Option<&'static [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | Some(slice::from_raw_parts(ptr, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/sigtrx.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | / core::arch::asm!( [INFO] [stdout] 13 | | // 1. 设置栈信息 [INFO] [stdout] 14 | | // sp = bootstack + (hartid + 1) * 0x10000 [INFO] [stdout] 15 | | " [INFO] [stdout] ... | [INFO] [stdout] 19 | | options(noreturn) [INFO] [stdout] 20 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/sigtrx.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | unsafe extern "C" fn _sigreturn() -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/x86_64/mod.rs:103:8 [INFO] [stdout] | [INFO] [stdout] 103 | if let Some(mboot) = use_multiboot(*MBOOT_PTR as _) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^---------^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/x86_64/mod.rs:124:5 [INFO] [stdout] | [INFO] [stdout] 124 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 103 ~ match use_multiboot(*MBOOT_PTR as _) { Some(mboot) => { [INFO] [stdout] 104 | mboot [INFO] [stdout] ... [INFO] [stdout] 123 | MEM_AREA.init_by(mem_area); [INFO] [stdout] 124 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 40 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 5.29s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking polyhal v0.1.0 (/tmp/fixit) [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/api.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / extern "Rust" { [INFO] [stdout] 5 | | pub(crate) fn _main_for_arch(hartid: usize); [INFO] [stdout] 6 | | pub(crate) fn _interrupt_for_arch(ctx: &mut TrapFrame, trap_type: TrapType); [INFO] [stdout] 7 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/api.rs:4:1 [INFO] [stdout] | [INFO] [stdout] 4 | / extern "Rust" { [INFO] [stdout] 5 | | pub(crate) fn _main_for_arch(hartid: usize); [INFO] [stdout] 6 | | pub(crate) fn _interrupt_for_arch(ctx: &mut TrapFrame, trap_type: TrapType); [INFO] [stdout] 7 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/idt.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | / extern "C" { [INFO] [stdout] 18 | | #[link_name = "trap_handler_table"] [INFO] [stdout] 19 | | static ENTRIES: [extern "C" fn(); NUM_INT]; [INFO] [stdout] 20 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/idt.rs:17:9 [INFO] [stdout] | [INFO] [stdout] 17 | / extern "C" { [INFO] [stdout] 18 | | #[link_name = "trap_handler_table"] [INFO] [stdout] 19 | | static ENTRIES: [extern "C" fn(); NUM_INT]; [INFO] [stdout] 20 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:46:3 [INFO] [stdout] | [INFO] [stdout] 46 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 46 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:46:3 [INFO] [stdout] | [INFO] [stdout] 46 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 46 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:74:3 [INFO] [stdout] | [INFO] [stdout] 74 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 74 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:115:3 [INFO] [stdout] | [INFO] [stdout] 115 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 115 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:165:3 [INFO] [stdout] | [INFO] [stdout] 165 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 165 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:212:3 [INFO] [stdout] | [INFO] [stdout] 212 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 212 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/multiboot.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 78 | / extern "C" { [INFO] [stdout] 79 | | fn _kernel_page_table(); [INFO] [stdout] 80 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/page_table.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | / extern "C" { [INFO] [stdout] 135 | | fn _kernel_mapping_pdpt(); [INFO] [stdout] 136 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:9:3 [INFO] [stdout] | [INFO] [stdout] 9 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 9 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:10:3 [INFO] [stdout] | [INFO] [stdout] 10 | #[link_section = ".sigtrx.sigreturn"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 10 | #[unsafe(link_section = ".sigtrx.sigreturn")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:23:3 [INFO] [stdout] | [INFO] [stdout] 23 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 23 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:26:3 [INFO] [stdout] | [INFO] [stdout] 26 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 26 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[link_section = ".bss.stack"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(link_section = ".bss.stack")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/lib.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | / extern "C" { [INFO] [stdout] 231 | | fn _sbss(); [INFO] [stdout] 232 | | fn _ebss(); [INFO] [stdout] 233 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:74:3 [INFO] [stdout] | [INFO] [stdout] 74 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 74 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:115:3 [INFO] [stdout] | [INFO] [stdout] 115 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 115 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:165:3 [INFO] [stdout] | [INFO] [stdout] 165 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 165 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/interrupt.rs:212:3 [INFO] [stdout] | [INFO] [stdout] 212 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 212 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/multiboot.rs:78:5 [INFO] [stdout] | [INFO] [stdout] 78 | / extern "C" { [INFO] [stdout] 79 | | fn _kernel_page_table(); [INFO] [stdout] 80 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/x86_64/page_table.rs:134:9 [INFO] [stdout] | [INFO] [stdout] 134 | / extern "C" { [INFO] [stdout] 135 | | fn _kernel_mapping_pdpt(); [INFO] [stdout] 136 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:9:3 [INFO] [stdout] | [INFO] [stdout] 9 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 9 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:10:3 [INFO] [stdout] | [INFO] [stdout] 10 | #[link_section = ".sigtrx.sigreturn"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 10 | #[unsafe(link_section = ".sigtrx.sigreturn")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:23:3 [INFO] [stdout] | [INFO] [stdout] 23 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 23 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/x86_64/sigtrx.rs:26:3 [INFO] [stdout] | [INFO] [stdout] 26 | #[link_section = ".data.prepage"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 26 | #[unsafe(link_section = ".data.prepage")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[link_section = ".bss.stack"] [INFO] [stdout] | ^^^^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(link_section = ".bss.stack")] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/lib.rs:230:5 [INFO] [stdout] | [INFO] [stdout] 230 | / extern "C" { [INFO] [stdout] 231 | | fn _sbss(); [INFO] [stdout] 232 | | fn _ebss(); [INFO] [stdout] 233 | | } [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:214:15 [INFO] [stdout] | [INFO] [stdout] 214 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:219:15 [INFO] [stdout] | [INFO] [stdout] 219 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:239:15 [INFO] [stdout] | [INFO] [stdout] 239 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:214:15 [INFO] [stdout] | [INFO] [stdout] 214 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:219:15 [INFO] [stdout] | [INFO] [stdout] 219 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `board` [INFO] [stdout] --> src/addr.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | #[cfg(board = "2k1000")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(board, values("2k1000"))'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(board, values(\"2k1000\"))");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `c906` [INFO] [stdout] --> src/addr.rs:239:15 [INFO] [stdout] | [INFO] [stdout] 239 | #[cfg(c906)] [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(c906)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(c906)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | #![feature(asm_const)] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:6:12 [INFO] [stdout] | [INFO] [stdout] 6 | #![feature(const_mut_refs)] [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `asm_const` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | #![feature(asm_const)] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `const_mut_refs` has been stable since 1.83.0-nightly and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:6:12 [INFO] [stdout] | [INFO] [stdout] 6 | #![feature(const_mut_refs)] [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/x86_64/multiboot.rs:58:45 [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stdout] | ^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stdout] | ~~~~~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/x86_64/multiboot.rs:58:45 [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, &mut MEM) } [INFO] [stdout] | ^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 58 | unsafe { Multiboot::from_ptr(mboot_ptr, addr_of_mut!(MEM)) } [INFO] [stdout] | ~~~~~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:10 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn get_unchecked(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:11 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:14 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe fn get_mut_unchecked(&mut self) -> &mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:15 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:10 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:66:5 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn get_unchecked(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:67:11 [INFO] [stdout] | [INFO] [stdout] 67 | &*(*self.data.get()).as_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:14 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/once/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe fn get_mut_unchecked(&mut self) -> &mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/once/mod.rs:75:15 [INFO] [stdout] | [INFO] [stdout] 75 | &mut *(*self.data.get()).as_mut_ptr() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::lgdt` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:74:9 [INFO] [stdout] | [INFO] [stdout] 74 | lgdt(&self.pointer()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn load(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::segmentation::Segment::set_reg` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:75:9 [INFO] [stdout] | [INFO] [stdout] 75 | CS::set_reg(Self::KCODE64_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::load_tss` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:85:9 [INFO] [stdout] | [INFO] [stdout] 85 | load_tss(Self::TSS_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn load_tss(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::lgdt` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:74:9 [INFO] [stdout] | [INFO] [stdout] 74 | lgdt(&self.pointer()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | pub unsafe fn load(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::segmentation::Segment::set_reg` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:75:9 [INFO] [stdout] | [INFO] [stdout] 75 | CS::set_reg(Self::KCODE64_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `x86_64::instructions::tables::load_tss` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/gdt.rs:85:9 [INFO] [stdout] | [INFO] [stdout] 85 | load_tss(Self::TSS_SELECTOR); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/gdt.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn load_tss(&'static self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:117:5 [INFO] [stdout] | [INFO] [stdout] 117 | / asm!( [INFO] [stdout] 118 | | r" [INFO] [stdout] 119 | | sub rsp, 16 # push fs_base, gs_base [INFO] [stdout] ... | [INFO] [stdout] 160 | | options(noreturn) [INFO] [stdout] 161 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:116:1 [INFO] [stdout] | [INFO] [stdout] 116 | pub unsafe extern "C" fn kernelvec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:167:5 [INFO] [stdout] | [INFO] [stdout] 167 | / asm!( [INFO] [stdout] 168 | | r" [INFO] [stdout] 169 | | sub rsp, 16 [INFO] [stdout] ... | [INFO] [stdout] 207 | | options(noreturn) [INFO] [stdout] 208 | | ); [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | pub unsafe extern "C" fn uservec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:279:5 [INFO] [stdout] | [INFO] [stdout] 279 | / asm!( [INFO] [stdout] 280 | | " [INFO] [stdout] 281 | | pop rcx [INFO] [stdout] 282 | | add rsp, 8 [INFO] [stdout] ... | [INFO] [stdout] 289 | | options(noreturn) [INFO] [stdout] 290 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:278:1 [INFO] [stdout] | [INFO] [stdout] 278 | unsafe extern "C" fn sysretq() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:319:5 [INFO] [stdout] | [INFO] [stdout] 319 | / asm!( [INFO] [stdout] 320 | | r" [INFO] [stdout] 321 | | swapgs [INFO] [stdout] 322 | | mov gs:[offset __PERCPU_USER_RSP], rsp [INFO] [stdout] ... | [INFO] [stdout] 375 | | options(noreturn) [INFO] [stdout] 376 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:318:1 [INFO] [stdout] | [INFO] [stdout] 318 | unsafe extern "C" fn syscall_entry() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:39:19 [INFO] [stdout] | [INFO] [stdout] 39 | let ptr = mem::transmute(addr | VIRT_ADDR_START as u64); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/multiboot.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | unsafe fn paddr_to_slice(&self, addr: PAddr, size: usize) -> Option<&'static [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | Some(slice::from_raw_parts(ptr, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:117:5 [INFO] [stdout] | [INFO] [stdout] 117 | / asm!( [INFO] [stdout] 118 | | r" [INFO] [stdout] 119 | | sub rsp, 16 # push fs_base, gs_base [INFO] [stdout] ... | [INFO] [stdout] 160 | | options(noreturn) [INFO] [stdout] 161 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:116:1 [INFO] [stdout] | [INFO] [stdout] 116 | pub unsafe extern "C" fn kernelvec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:167:5 [INFO] [stdout] | [INFO] [stdout] 167 | / asm!( [INFO] [stdout] 168 | | r" [INFO] [stdout] 169 | | sub rsp, 16 [INFO] [stdout] ... | [INFO] [stdout] 207 | | options(noreturn) [INFO] [stdout] 208 | | ); [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | pub unsafe extern "C" fn uservec() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:279:5 [INFO] [stdout] | [INFO] [stdout] 279 | / asm!( [INFO] [stdout] 280 | | " [INFO] [stdout] 281 | | pop rcx [INFO] [stdout] 282 | | add rsp, 8 [INFO] [stdout] ... | [INFO] [stdout] 289 | | options(noreturn) [INFO] [stdout] 290 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:278:1 [INFO] [stdout] | [INFO] [stdout] 278 | unsafe extern "C" fn sysretq() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/interrupt.rs:319:5 [INFO] [stdout] | [INFO] [stdout] 319 | / asm!( [INFO] [stdout] 320 | | r" [INFO] [stdout] 321 | | swapgs [INFO] [stdout] 322 | | mov gs:[offset __PERCPU_USER_RSP], rsp [INFO] [stdout] ... | [INFO] [stdout] 375 | | options(noreturn) [INFO] [stdout] 376 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/interrupt.rs:318:1 [INFO] [stdout] | [INFO] [stdout] 318 | unsafe extern "C" fn syscall_entry() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:39:19 [INFO] [stdout] | [INFO] [stdout] 39 | let ptr = mem::transmute(addr | VIRT_ADDR_START as u64); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/multiboot.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | unsafe fn paddr_to_slice(&self, addr: PAddr, size: usize) -> Option<&'static [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/multiboot.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | Some(slice::from_raw_parts(ptr, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/sigtrx.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | / core::arch::asm!( [INFO] [stdout] 13 | | // 1. 设置栈信息 [INFO] [stdout] 14 | | // sp = bootstack + (hartid + 1) * 0x10000 [INFO] [stdout] 15 | | " [INFO] [stdout] ... | [INFO] [stdout] 19 | | options(noreturn) [INFO] [stdout] 20 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/sigtrx.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | unsafe extern "C" fn _sigreturn() -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of inline assembly is unsafe and requires unsafe block [INFO] [stdout] --> src/x86_64/sigtrx.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | / core::arch::asm!( [INFO] [stdout] 13 | | // 1. 设置栈信息 [INFO] [stdout] 14 | | // sp = bootstack + (hartid + 1) * 0x10000 [INFO] [stdout] 15 | | " [INFO] [stdout] ... | [INFO] [stdout] 19 | | options(noreturn) [INFO] [stdout] 20 | | ) [INFO] [stdout] | |_____^ use of inline assembly [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: inline assembly is entirely unchecked and can cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/x86_64/sigtrx.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | unsafe extern "C" fn _sigreturn() -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 18 previous errors; 20 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] Some errors have detailed explanations: E0133, E0796. [INFO] [stdout] [INFO] [stdout] For more information about an error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] error: aborting due to 18 previous errors; 20 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] Some errors have detailed explanations: E0133, E0796. [INFO] [stdout] [INFO] [stdout] For more information about an error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `polyhal` (lib test) due to 19 previous errors; 20 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stderr] error: could not compile `polyhal` (lib) due to 19 previous errors; 20 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "d669517bb08f0bff4ed38ece9a24a757330d99d33d0c4e8e5ddcdfe6ac3af02d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d669517bb08f0bff4ed38ece9a24a757330d99d33d0c4e8e5ddcdfe6ac3af02d", kill_on_drop: false }` [INFO] [stdout] d669517bb08f0bff4ed38ece9a24a757330d99d33d0c4e8e5ddcdfe6ac3af02d