[INFO] cloning repository https://github.com/brodiealexander/fjage-rs [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/brodiealexander/fjage-rs" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrodiealexander%2Ffjage-rs", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrodiealexander%2Ffjage-rs'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] cf101aa03af301de2c3eb2574ff533c99f6e24cf [INFO] checking brodiealexander/fjage-rs/cf101aa03af301de2c3eb2574ff533c99f6e24cf against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbrodiealexander%2Ffjage-rs" "/workspace/builds/worker-3-tc2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-3-tc2/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/brodiealexander/fjage-rs on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/brodiealexander/fjage-rs [INFO] finished tweaking git repo https://github.com/brodiealexander/fjage-rs [INFO] tweaked toml for git repo https://github.com/brodiealexander/fjage-rs written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] crate git repo https://github.com/brodiealexander/fjage-rs already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:6252d7ea7fb8caaf7af6d800c5fb250a9cd862b9a7f9508afb3c54fa7fe1102e" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 5141333492a038e1419d6bba2197f23b224bca0d2c794ffa78c6a80297ca5afb [INFO] running `Command { std: "docker" "start" "-a" "5141333492a038e1419d6bba2197f23b224bca0d2c794ffa78c6a80297ca5afb", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "5141333492a038e1419d6bba2197f23b224bca0d2c794ffa78c6a80297ca5afb", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5141333492a038e1419d6bba2197f23b224bca0d2c794ffa78c6a80297ca5afb", kill_on_drop: false }` [INFO] [stdout] 5141333492a038e1419d6bba2197f23b224bca0d2c794ffa78c6a80297ca5afb [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:6252d7ea7fb8caaf7af6d800c5fb250a9cd862b9a7f9508afb3c54fa7fe1102e" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f0a551c2217fb60a84671ab8b730c234f4ad8480525b8df8e470ef972289aa29 [INFO] running `Command { std: "docker" "start" "-a" "f0a551c2217fb60a84671ab8b730c234f4ad8480525b8df8e470ef972289aa29", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Compiling libc v0.2.155 [INFO] [stderr] Checking scopeguard v1.2.0 [INFO] [stderr] Checking futures-core v0.3.30 [INFO] [stderr] Checking futures-sink v0.3.30 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Compiling memoffset v0.7.1 [INFO] [stderr] Checking log v0.4.22 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Checking bitflags v2.6.0 [INFO] [stderr] Compiling serde_json v1.0.120 [INFO] [stderr] Checking lock_api v0.4.12 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Compiling quote v1.0.36 [INFO] [stderr] Compiling syn v2.0.68 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking mio v0.8.11 [INFO] [stderr] Checking nix v0.26.4 [INFO] [stderr] Checking num_cpus v1.16.0 [INFO] [stderr] Checking signal-hook-registry v1.4.2 [INFO] [stderr] Checking socket2 v0.5.7 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking parking_lot v0.12.3 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Compiling thiserror-impl v1.0.61 [INFO] [stderr] Compiling futures-macro v0.3.30 [INFO] [stderr] Compiling serde_derive v1.0.203 [INFO] [stderr] Compiling tokio-macros v2.3.0 [INFO] [stderr] Compiling uuid-macro-internal v1.9.1 [INFO] [stderr] Checking tokio v1.38.0 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Checking thiserror v1.0.61 [INFO] [stderr] Checking unescaper v0.1.5 [INFO] [stderr] Checking serialport v4.4.0 [INFO] [stderr] Checking mio-serial v5.0.5 [INFO] [stderr] Checking serde v1.0.203 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Checking futures v0.3.30 [INFO] [stderr] Checking tokio-serial v5.4.4 [INFO] [stderr] Checking uuid v1.9.1 [INFO] [stderr] Checking fjage_rs v0.1.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `fjage_rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/ffi/mod.rs [INFO] [stderr] * src/ffi/util.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:6 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:22 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:38 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:56 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:85 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unused variable: `settings` [INFO] [stderr] --> src/ffi/mod.rs:37:5 [INFO] [stderr] | [INFO] [stderr] 37 | settings: *const c_char, [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `devname` [INFO] [stderr] --> src/ffi/mod.rs:57:5 [INFO] [stderr] | [INFO] [stderr] 57 | devname: *const c_char, [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_devname` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `baud` [INFO] [stderr] --> src/ffi/mod.rs:58:5 [INFO] [stderr] | [INFO] [stderr] 58 | baud: c_int, [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_baud` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `settings` [INFO] [stderr] --> src/ffi/mod.rs:59:5 [INFO] [stderr] | [INFO] [stderr] 59 | settings: *const c_char, [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stderr] [INFO] [stderr] error: aborting due to 5 previous errors; 4 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:24:3 [INFO] [stdout] | [INFO] [stdout] 24 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 24 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:39:3 [INFO] [stdout] | [INFO] [stdout] 39 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 39 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:61:3 [INFO] [stdout] | [INFO] [stdout] 61 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 61 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:89:3 [INFO] [stdout] | [INFO] [stdout] 89 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 89 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:105:3 [INFO] [stdout] | [INFO] [stdout] 105 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 105 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:121:3 [INFO] [stdout] | [INFO] [stdout] 121 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 121 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 131 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:196:3 [INFO] [stdout] | [INFO] [stdout] 196 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 196 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:215:3 [INFO] [stdout] | [INFO] [stdout] 215 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 215 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:228:3 [INFO] [stdout] | [INFO] [stdout] 228 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 228 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:247:3 [INFO] [stdout] | [INFO] [stdout] 247 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 247 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:279:3 [INFO] [stdout] | [INFO] [stdout] 279 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 279 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:292:3 [INFO] [stdout] | [INFO] [stdout] 292 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 292 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:310:3 [INFO] [stdout] | [INFO] [stdout] 310 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 310 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:325:3 [INFO] [stdout] | [INFO] [stdout] 325 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 325 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:346:3 [INFO] [stdout] | [INFO] [stdout] 346 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 346 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:366:3 [INFO] [stdout] | [INFO] [stdout] 366 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 366 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:383:3 [INFO] [stdout] | [INFO] [stdout] 383 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 383 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:400:3 [INFO] [stdout] | [INFO] [stdout] 400 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 400 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:427:3 [INFO] [stdout] | [INFO] [stdout] 427 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 427 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:469:3 [INFO] [stdout] | [INFO] [stdout] 469 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 469 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:481:3 [INFO] [stdout] | [INFO] [stdout] 481 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 481 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:503:3 [INFO] [stdout] | [INFO] [stdout] 503 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 503 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:515:3 [INFO] [stdout] | [INFO] [stdout] 515 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 515 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:86:3 [INFO] [stdout] | [INFO] [stdout] 86 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 86 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:130:3 [INFO] [stdout] | [INFO] [stdout] 130 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 130 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:161:3 [INFO] [stdout] | [INFO] [stdout] 161 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 161 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:193:3 [INFO] [stdout] | [INFO] [stdout] 193 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 193 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:219:3 [INFO] [stdout] | [INFO] [stdout] 219 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 219 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:245:3 [INFO] [stdout] | [INFO] [stdout] 245 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 245 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:271:3 [INFO] [stdout] | [INFO] [stdout] 271 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 271 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:298:3 [INFO] [stdout] | [INFO] [stdout] 298 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 298 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:352:3 [INFO] [stdout] | [INFO] [stdout] 352 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 352 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:413:3 [INFO] [stdout] | [INFO] [stdout] 413 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 413 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:436:3 [INFO] [stdout] | [INFO] [stdout] 436 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 436 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:459:3 [INFO] [stdout] | [INFO] [stdout] 459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:499:3 [INFO] [stdout] | [INFO] [stdout] 499 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 499 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:524:3 [INFO] [stdout] | [INFO] [stdout] 524 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 524 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:548:3 [INFO] [stdout] | [INFO] [stdout] 548 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 548 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:573:3 [INFO] [stdout] | [INFO] [stdout] 573 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 573 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:599:3 [INFO] [stdout] | [INFO] [stdout] 599 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 599 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:15:3 [INFO] [stdout] | [INFO] [stdout] 15 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 15 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:33:3 [INFO] [stdout] | [INFO] [stdout] 33 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:55:3 [INFO] [stdout] | [INFO] [stdout] 55 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 55 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:87:3 [INFO] [stdout] | [INFO] [stdout] 87 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 87 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 101 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:114:3 [INFO] [stdout] | [INFO] [stdout] 114 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 114 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:129:3 [INFO] [stdout] | [INFO] [stdout] 129 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 129 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:144:3 [INFO] [stdout] | [INFO] [stdout] 144 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 144 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:160:3 [INFO] [stdout] | [INFO] [stdout] 160 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 160 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:187:3 [INFO] [stdout] | [INFO] [stdout] 187 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 187 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:248:3 [INFO] [stdout] | [INFO] [stdout] 248 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 248 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:334:3 [INFO] [stdout] | [INFO] [stdout] 334 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 334 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:350:3 [INFO] [stdout] | [INFO] [stdout] 350 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 350 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:363:3 [INFO] [stdout] | [INFO] [stdout] 363 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 363 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:388:3 [INFO] [stdout] | [INFO] [stdout] 388 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 388 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:11 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr_2021, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:22 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr_2021, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:35 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr_2021, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:49 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr_2021, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:73 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:32:16 [INFO] [stdout] | [INFO] [stdout] 32 | if (bytes_read.is_err()) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_parens)]` on by default [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 32 - if (bytes_read.is_err()) { [INFO] [stdout] 32 + if bytes_read.is_err() { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:36:16 [INFO] [stdout] | [INFO] [stdout] 36 | if (bytes_read == 0) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 36 - if (bytes_read == 0) { [INFO] [stdout] 36 + if bytes_read == 0 { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:106:16 [INFO] [stdout] | [INFO] [stdout] 106 | if (bytes_read.is_err()) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 106 - if (bytes_read.is_err()) { [INFO] [stdout] 106 + if bytes_read.is_err() { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:113:16 [INFO] [stdout] | [INFO] [stdout] 113 | if (bytes_read == 0) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 113 - if (bytes_read == 0) { [INFO] [stdout] 113 + if bytes_read == 0 { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/protocol/connector.rs:27:57 [INFO] [stdout] | [INFO] [stdout] 27 | async fn read_task(stream: T, mut sender: UnboundedSender) { [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/protocol/connector.rs:101:57 [INFO] [stdout] | [INFO] [stdout] 101 | async fn read_task(stream: T, mut sender: UnboundedSender) { [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:26:15 [INFO] [stdout] | [INFO] [stdout] 26 | let msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:25:1 [INFO] [stdout] | [INFO] [stdout] 25 | pub unsafe extern "C" fn fjage_msg_create(clazz: *mut c_char, perf: c_int) -> *mut fjage_msg_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:27:24 [INFO] [stdout] | [INFO] [stdout] 27 | let msg_ref = &mut msg.as_mut().unwrap().msg; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:28:21 [INFO] [stdout] | [INFO] [stdout] 28 | msg_ref.clazz = c_api_cstr_to_string(clazz); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_int_to_perf` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:29:25 [INFO] [stdout] | [INFO] [stdout] 29 | msg_ref.data.perf = c_api_int_to_perf(perf); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:40:1 [INFO] [stdout] | [INFO] [stdout] 40 | pub unsafe extern "C" fn fjage_msg_destroy(msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | fjage_msg_t::strkey_set(msg, "recipient", Value::String(c_api_cstr_to_string(aid))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | pub unsafe extern "C" fn fjage_msg_set_recipient(msg: *mut fjage_msg_t, aid: *const c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:52:61 [INFO] [stdout] | [INFO] [stdout] 52 | fjage_msg_t::strkey_set(msg, "recipient", Value::String(c_api_cstr_to_string(aid))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | msg.as_mut().unwrap().msg.data.inReplyTo = Some(c_api_cstr_to_string(id)); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:62:1 [INFO] [stdout] | [INFO] [stdout] 62 | pub unsafe extern "C" fn fjage_msg_set_in_reply_to(msg: *mut fjage_msg_t, id: *const c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:63:53 [INFO] [stdout] | [INFO] [stdout] 63 | msg.as_mut().unwrap().msg.data.inReplyTo = Some(c_api_cstr_to_string(id)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | fjage_msg_t::set(msg, key, Value::String(c_api_cstr_to_string(value))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:74:1 [INFO] [stdout] | [INFO] [stdout] 74 | / pub unsafe extern "C" fn fjage_msg_add_string( [INFO] [stdout] 75 | | msg: *mut fjage_msg_t, [INFO] [stdout] 76 | | key: *const c_char, [INFO] [stdout] 77 | | value: *const c_char, [INFO] [stdout] 78 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:79:46 [INFO] [stdout] | [INFO] [stdout] 79 | fjage_msg_t::set(msg, key, Value::String(c_api_cstr_to_string(value))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:90:1 [INFO] [stdout] | [INFO] [stdout] 90 | / pub unsafe extern "C" fn fjage_msg_add_int( [INFO] [stdout] 91 | | msg: *mut fjage_msg_t, [INFO] [stdout] 92 | | key: *const c_char, [INFO] [stdout] 93 | | value: c_int, [INFO] [stdout] 94 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:111:5 [INFO] [stdout] | [INFO] [stdout] 111 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:106:1 [INFO] [stdout] | [INFO] [stdout] 106 | / pub unsafe extern "C" fn fjage_msg_add_long( [INFO] [stdout] 107 | | msg: *mut fjage_msg_t, [INFO] [stdout] 108 | | key: *const c_char, [INFO] [stdout] 109 | | value: c_long, [INFO] [stdout] 110 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:127:5 [INFO] [stdout] | [INFO] [stdout] 127 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | / pub unsafe extern "C" fn fjage_msg_add_float( [INFO] [stdout] 123 | | msg: *mut fjage_msg_t, [INFO] [stdout] 124 | | key: *const c_char, [INFO] [stdout] 125 | | value: c_float, [INFO] [stdout] 126 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:132:1 [INFO] [stdout] | [INFO] [stdout] 132 | / pub unsafe extern "C" fn fjage_msg_add_double( [INFO] [stdout] 133 | | msg: *mut fjage_msg_t, [INFO] [stdout] 134 | | key: *const c_char, [INFO] [stdout] 135 | | value: c_double, [INFO] [stdout] 136 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:153:5 [INFO] [stdout] | [INFO] [stdout] 153 | fjage_msg_t::set(msg, key, Value::Bool(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn fjage_msg_add_bool( [INFO] [stdout] 149 | | msg: *mut fjage_msg_t, [INFO] [stdout] 150 | | key: *const c_char, [INFO] [stdout] 151 | | value: bool, [INFO] [stdout] 152 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:171:15 [INFO] [stdout] | [INFO] [stdout] 171 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn fjage_msg_add_byte_array( [INFO] [stdout] 166 | | msg: *mut fjage_msg_t, [INFO] [stdout] 167 | | key: *const c_char, [INFO] [stdout] 168 | | value: *mut u8, [INFO] [stdout] 169 | | len: c_int, [INFO] [stdout] 170 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:191:15 [INFO] [stdout] | [INFO] [stdout] 191 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | / pub unsafe extern "C" fn fjage_msg_add_int_array( [INFO] [stdout] 186 | | msg: *mut fjage_msg_t, [INFO] [stdout] 187 | | key: *const c_char, [INFO] [stdout] 188 | | value: *mut i32, [INFO] [stdout] 189 | | len: c_int, [INFO] [stdout] 190 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:192:5 [INFO] [stdout] | [INFO] [stdout] 192 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:203:15 [INFO] [stdout] | [INFO] [stdout] 203 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / pub unsafe extern "C" fn fjage_msg_add_long_array( [INFO] [stdout] 198 | | msg: *mut fjage_msg_t, [INFO] [stdout] 199 | | key: *const c_char, [INFO] [stdout] 200 | | value: *const i64, [INFO] [stdout] 201 | | len: c_int, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:222:15 [INFO] [stdout] | [INFO] [stdout] 222 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:216:1 [INFO] [stdout] | [INFO] [stdout] 216 | / pub unsafe extern "C" fn fjage_msg_add_float_array( [INFO] [stdout] 217 | | msg: *mut fjage_msg_t, [INFO] [stdout] 218 | | key: *const c_char, [INFO] [stdout] 219 | | value: *mut c_float, [INFO] [stdout] 220 | | len: c_int, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:223:5 [INFO] [stdout] | [INFO] [stdout] 223 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:229:1 [INFO] [stdout] | [INFO] [stdout] 229 | / pub unsafe extern "C" fn fjage_msg_add_double_array( [INFO] [stdout] 230 | | msg: *mut fjage_msg_t, [INFO] [stdout] 231 | | key: *const c_char, [INFO] [stdout] 232 | | value: *const c_double, [INFO] [stdout] 233 | | len: c_int, [INFO] [stdout] 234 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:236:5 [INFO] [stdout] | [INFO] [stdout] 236 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:250:14 [INFO] [stdout] | [INFO] [stdout] 250 | let id = fjage_msg_t::strkey_get(msg, "msgID") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:248:1 [INFO] [stdout] | [INFO] [stdout] 248 | pub unsafe extern "C" fn fjage_msg_get_id(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:254:14 [INFO] [stdout] | [INFO] [stdout] 254 | let id = msg.as_mut().unwrap().alloc_str(id); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:254:14 [INFO] [stdout] | [INFO] [stdout] 254 | let id = msg.as_mut().unwrap().alloc_str(id); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:268:18 [INFO] [stdout] | [INFO] [stdout] 268 | let clazz = &msg.as_ref().unwrap().msg.clazz; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | pub unsafe extern "C" fn fjage_msg_get_clazz(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:269:17 [INFO] [stdout] | [INFO] [stdout] 269 | let clazz = msg.as_mut().unwrap().alloc_str(clazz.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:269:17 [INFO] [stdout] | [INFO] [stdout] 269 | let clazz = msg.as_mut().unwrap().alloc_str(clazz.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_perf_to_int` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:281:12 [INFO] [stdout] | [INFO] [stdout] 281 | return c_api_perf_to_int(&msg.as_ref().unwrap().msg.data.perf); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:280:1 [INFO] [stdout] | [INFO] [stdout] 280 | pub unsafe extern "C" fn fjage_msg_get_performative(msg: *mut fjage_msg_t) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:281:31 [INFO] [stdout] | [INFO] [stdout] 281 | return c_api_perf_to_int(&msg.as_ref().unwrap().msg.data.perf); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:294:22 [INFO] [stdout] | [INFO] [stdout] 294 | let recipient = &msg.as_ref().unwrap().msg.data.recipient; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:293:1 [INFO] [stdout] | [INFO] [stdout] 293 | pub unsafe extern "C" fn fjage_msg_get_recipient(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:298:21 [INFO] [stdout] | [INFO] [stdout] 298 | let recipient = msg.as_mut().unwrap().alloc_str(recipient.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:298:21 [INFO] [stdout] | [INFO] [stdout] 298 | let recipient = msg.as_mut().unwrap().alloc_str(recipient.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:312:19 [INFO] [stdout] | [INFO] [stdout] 312 | let sender = &msg.as_ref().unwrap().msg.data.sender; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:311:1 [INFO] [stdout] | [INFO] [stdout] 311 | pub unsafe extern "C" fn fjage_msg_get_sender(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:313:18 [INFO] [stdout] | [INFO] [stdout] 313 | let sender = msg.as_mut().unwrap().alloc_str(sender.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:313:18 [INFO] [stdout] | [INFO] [stdout] 313 | let sender = msg.as_mut().unwrap().alloc_str(sender.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:327:16 [INFO] [stdout] | [INFO] [stdout] 327 | let irp = &msg.as_ref().unwrap().msg.data.inReplyTo; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:326:1 [INFO] [stdout] | [INFO] [stdout] 326 | pub unsafe extern "C" fn fjage_msg_get_in_reply_to(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:332:15 [INFO] [stdout] | [INFO] [stdout] 332 | let irp = msg.as_mut().unwrap().alloc_str(irp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:332:15 [INFO] [stdout] | [INFO] [stdout] 332 | let irp = msg.as_mut().unwrap().alloc_str(irp); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:351:13 [INFO] [stdout] | [INFO] [stdout] 351 | let x = fjage_msg_t::get(msg, key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:347:1 [INFO] [stdout] | [INFO] [stdout] 347 | / pub unsafe extern "C" fn fjage_msg_get_string( [INFO] [stdout] 348 | | msg: *mut fjage_msg_t, [INFO] [stdout] 349 | | key: *const c_char, [INFO] [stdout] 350 | | ) -> *const c_char { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str_s` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:355:12 [INFO] [stdout] | [INFO] [stdout] 355 | return fjage_msg_t::alloc_str_s(msg, x.as_str().unwrap_or("").to_string()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:372:12 [INFO] [stdout] | [INFO] [stdout] 372 | return fjage_msg_t::get(msg, key).as_i64().unwrap_or(defval as i64) as c_int; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:367:1 [INFO] [stdout] | [INFO] [stdout] 367 | / pub unsafe extern "C" fn fjage_msg_get_int( [INFO] [stdout] 368 | | msg: *mut fjage_msg_t, [INFO] [stdout] 369 | | key: *const c_char, [INFO] [stdout] 370 | | defval: c_int, [INFO] [stdout] 371 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:389:12 [INFO] [stdout] | [INFO] [stdout] 389 | return fjage_msg_t::get(msg, key).as_i64().unwrap_or(defval as i64) as c_long; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:384:1 [INFO] [stdout] | [INFO] [stdout] 384 | / pub unsafe extern "C" fn fjage_msg_get_long( [INFO] [stdout] 385 | | msg: *mut fjage_msg_t, [INFO] [stdout] 386 | | key: *const c_char, [INFO] [stdout] 387 | | defval: c_long, [INFO] [stdout] 388 | | ) -> c_long { [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:406:12 [INFO] [stdout] | [INFO] [stdout] 406 | return fjage_msg_t::get(msg, key).as_f64().unwrap_or(defval as f64) as c_float; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:401:1 [INFO] [stdout] | [INFO] [stdout] 401 | / pub unsafe extern "C" fn fjage_msg_get_float( [INFO] [stdout] 402 | | msg: *mut fjage_msg_t, [INFO] [stdout] 403 | | key: *const c_char, [INFO] [stdout] 404 | | defval: c_float, [INFO] [stdout] 405 | | ) -> c_float { [INFO] [stdout] | |____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:416:12 [INFO] [stdout] | [INFO] [stdout] 416 | return fjage_msg_t::get(msg, key).as_f64().unwrap_or(defval as f64) as c_double; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn fjage_msg_get_double( [INFO] [stdout] 412 | | msg: *mut fjage_msg_t, [INFO] [stdout] 413 | | key: *const c_char, [INFO] [stdout] 414 | | defval: c_double, [INFO] [stdout] 415 | | ) -> c_double { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:433:12 [INFO] [stdout] | [INFO] [stdout] 433 | return fjage_msg_t::get(msg, key).as_bool().unwrap_or(defval); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | / pub unsafe extern "C" fn fjage_msg_get_bool( [INFO] [stdout] 429 | | msg: *mut fjage_msg_t, [INFO] [stdout] 430 | | key: *const c_char, [INFO] [stdout] 431 | | defval: bool, [INFO] [stdout] 432 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:454:12 [INFO] [stdout] | [INFO] [stdout] 454 | return msg_get_array!(msg, key, value, maxlen, u8, |x| x.as_u64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 455 | | as u8); [INFO] [stdout] | |______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn fjage_msg_get_byte_array( [INFO] [stdout] 449 | | msg: *mut fjage_msg_t, [INFO] [stdout] 450 | | key: *const c_char, [INFO] [stdout] 451 | | value: *mut u8, [INFO] [stdout] 452 | | maxlen: c_int, [INFO] [stdout] 453 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:454:12 [INFO] [stdout] | [INFO] [stdout] 454 | return msg_get_array!(msg, key, value, maxlen, u8, |x| x.as_u64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 455 | | as u8); [INFO] [stdout] | |______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:476:12 [INFO] [stdout] | [INFO] [stdout] 476 | return msg_get_array!(msg, key, value, maxlen, i32, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 477 | | as i32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:470:1 [INFO] [stdout] | [INFO] [stdout] 470 | / pub unsafe extern "C" fn fjage_msg_get_int_array( [INFO] [stdout] 471 | | msg: *mut fjage_msg_t, [INFO] [stdout] 472 | | key: *const c_char, [INFO] [stdout] 473 | | value: *mut i32, [INFO] [stdout] 474 | | maxlen: c_int, [INFO] [stdout] 475 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:476:12 [INFO] [stdout] | [INFO] [stdout] 476 | return msg_get_array!(msg, key, value, maxlen, i32, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 477 | | as i32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:488:12 [INFO] [stdout] | [INFO] [stdout] 488 | return msg_get_array!(msg, key, value, maxlen, i64, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 489 | | as i64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:482:1 [INFO] [stdout] | [INFO] [stdout] 482 | / pub unsafe extern "C" fn fjage_msg_get_long_array( [INFO] [stdout] 483 | | msg: *mut fjage_msg_t, [INFO] [stdout] 484 | | key: *const c_char, [INFO] [stdout] 485 | | value: *mut i64, [INFO] [stdout] 486 | | maxlen: c_int, [INFO] [stdout] 487 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:488:12 [INFO] [stdout] | [INFO] [stdout] 488 | return msg_get_array!(msg, key, value, maxlen, i64, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 489 | | as i64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:510:12 [INFO] [stdout] | [INFO] [stdout] 510 | return msg_get_array!(msg, key, value, maxlen, f32, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 511 | | as f32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:504:1 [INFO] [stdout] | [INFO] [stdout] 504 | / pub unsafe extern "C" fn fjage_msg_get_float_array( [INFO] [stdout] 505 | | msg: *mut fjage_msg_t, [INFO] [stdout] 506 | | key: *const c_char, [INFO] [stdout] 507 | | value: *mut f32, [INFO] [stdout] 508 | | maxlen: c_int, [INFO] [stdout] 509 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:510:12 [INFO] [stdout] | [INFO] [stdout] 510 | return msg_get_array!(msg, key, value, maxlen, f32, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 511 | | as f32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:522:12 [INFO] [stdout] | [INFO] [stdout] 522 | return msg_get_array!(msg, key, value, maxlen, f64, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 523 | | as f64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:516:1 [INFO] [stdout] | [INFO] [stdout] 516 | / pub unsafe extern "C" fn fjage_msg_get_double_array( [INFO] [stdout] 517 | | msg: *mut fjage_msg_t, [INFO] [stdout] 518 | | key: *const c_char, [INFO] [stdout] 519 | | value: *mut f64, [INFO] [stdout] 520 | | maxlen: c_int, [INFO] [stdout] 521 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:522:12 [INFO] [stdout] | [INFO] [stdout] 522 | return msg_get_array!(msg, key, value, maxlen, f64, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 523 | | as f64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:40:15 [INFO] [stdout] | [INFO] [stdout] 40 | let val = gw.as_mut().unwrap().get_int( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | / pub unsafe extern "C" fn fjage_param_get_int( [INFO] [stdout] 24 | | gw: *mut Gateway, [INFO] [stdout] 25 | | aid: *const c_char, [INFO] [stdout] 26 | | param: *const c_char, [INFO] [stdout] 27 | | ndx: c_int, [INFO] [stdout] 28 | | defval: c_int, [INFO] [stdout] 29 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:41:10 [INFO] [stdout] | [INFO] [stdout] 41 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:42:10 [INFO] [stdout] | [INFO] [stdout] 42 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:67:15 [INFO] [stdout] | [INFO] [stdout] 67 | let val = gw.as_mut().unwrap().get_long( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:60:1 [INFO] [stdout] | [INFO] [stdout] 60 | / pub unsafe extern "C" fn fjage_param_get_long( [INFO] [stdout] 61 | | gw: *mut Gateway, [INFO] [stdout] 62 | | aid: *const c_char, [INFO] [stdout] 63 | | param: *const c_char, [INFO] [stdout] 64 | | ndx: c_int, [INFO] [stdout] 65 | | defval: i64, [INFO] [stdout] 66 | | ) -> i64 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:68:10 [INFO] [stdout] | [INFO] [stdout] 68 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:69:10 [INFO] [stdout] | [INFO] [stdout] 69 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:94:15 [INFO] [stdout] | [INFO] [stdout] 94 | let val = gw.as_mut().unwrap().get_float( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:87:1 [INFO] [stdout] | [INFO] [stdout] 87 | / pub unsafe extern "C" fn fjage_param_get_float( [INFO] [stdout] 88 | | gw: *mut Gateway, [INFO] [stdout] 89 | | aid: *const c_char, [INFO] [stdout] 90 | | param: *const c_char, [INFO] [stdout] 91 | | ndx: c_int, [INFO] [stdout] 92 | | defval: c_float, [INFO] [stdout] 93 | | ) -> c_float { [INFO] [stdout] | |____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:95:10 [INFO] [stdout] | [INFO] [stdout] 95 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:111:15 [INFO] [stdout] | [INFO] [stdout] 111 | let val = gw.as_mut().unwrap().get_double( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn fjage_param_get_double( [INFO] [stdout] 105 | | gw: *mut Gateway, [INFO] [stdout] 106 | | aid: *const c_char, [INFO] [stdout] 107 | | param: *const c_char, [INFO] [stdout] 108 | | ndx: c_int, [INFO] [stdout] 109 | | defval: c_double, [INFO] [stdout] 110 | | ) -> c_double { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:112:10 [INFO] [stdout] | [INFO] [stdout] 112 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:113:10 [INFO] [stdout] | [INFO] [stdout] 113 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:140:15 [INFO] [stdout] | [INFO] [stdout] 140 | let val = gw.as_mut().unwrap().get_bool( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:131:1 [INFO] [stdout] | [INFO] [stdout] 131 | / pub unsafe extern "C" fn fjage_param_get_bool( [INFO] [stdout] 132 | | gw: *mut Gateway, [INFO] [stdout] 133 | | aid: *const c_char, [INFO] [stdout] 134 | | param: *const c_char, [INFO] [stdout] 135 | | ndx: c_int, [INFO] [stdout] 136 | | defval: c_int, [INFO] [stdout] 137 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:141:10 [INFO] [stdout] | [INFO] [stdout] 141 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:142:10 [INFO] [stdout] | [INFO] [stdout] 142 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:170:15 [INFO] [stdout] | [INFO] [stdout] 170 | let val = gw.as_mut().unwrap().get_string( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:162:1 [INFO] [stdout] | [INFO] [stdout] 162 | / pub unsafe extern "C" fn fjage_param_get_string( [INFO] [stdout] 163 | | gw: *mut Gateway, [INFO] [stdout] 164 | | aid: *const c_char, [INFO] [stdout] 165 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 168 | | len: c_int, [INFO] [stdout] 169 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:171:10 [INFO] [stdout] | [INFO] [stdout] 171 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:172:10 [INFO] [stdout] | [INFO] [stdout] 172 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::copy_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | val.as_str().as_ptr().copy_to(strval.cast(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:202:15 [INFO] [stdout] | [INFO] [stdout] 202 | let val = gw.as_mut().unwrap().get_int_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:194:1 [INFO] [stdout] | [INFO] [stdout] 194 | / pub unsafe extern "C" fn fjage_param_get_int_array( [INFO] [stdout] 195 | | gw: *mut Gateway, [INFO] [stdout] 196 | | aid: *const c_char, [INFO] [stdout] 197 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 200 | | ndx: c_int, [INFO] [stdout] 201 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:203:10 [INFO] [stdout] | [INFO] [stdout] 203 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:204:10 [INFO] [stdout] | [INFO] [stdout] 204 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:228:15 [INFO] [stdout] | [INFO] [stdout] 228 | let val = gw.as_mut().unwrap().get_long_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:220:1 [INFO] [stdout] | [INFO] [stdout] 220 | / pub unsafe extern "C" fn fjage_param_get_long_array( [INFO] [stdout] 221 | | gw: *mut Gateway, [INFO] [stdout] 222 | | aid: *const c_char, [INFO] [stdout] 223 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 226 | | ndx: c_int, [INFO] [stdout] 227 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:229:10 [INFO] [stdout] | [INFO] [stdout] 229 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:230:10 [INFO] [stdout] | [INFO] [stdout] 230 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:240:5 [INFO] [stdout] | [INFO] [stdout] 240 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:254:15 [INFO] [stdout] | [INFO] [stdout] 254 | let val = gw.as_mut().unwrap().get_float_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:246:1 [INFO] [stdout] | [INFO] [stdout] 246 | / pub unsafe extern "C" fn fjage_param_get_float_array( [INFO] [stdout] 247 | | gw: *mut Gateway, [INFO] [stdout] 248 | | aid: *const c_char, [INFO] [stdout] 249 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 252 | | ndx: c_int, [INFO] [stdout] 253 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:255:10 [INFO] [stdout] | [INFO] [stdout] 255 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:256:10 [INFO] [stdout] | [INFO] [stdout] 256 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:280:15 [INFO] [stdout] | [INFO] [stdout] 280 | let val = gw.as_mut().unwrap().get_double_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:272:1 [INFO] [stdout] | [INFO] [stdout] 272 | / pub unsafe extern "C" fn fjage_param_get_double_array( [INFO] [stdout] 273 | | gw: *mut Gateway, [INFO] [stdout] 274 | | aid: *const c_char, [INFO] [stdout] 275 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 278 | | ndx: c_int, [INFO] [stdout] 279 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:281:10 [INFO] [stdout] | [INFO] [stdout] 281 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:282:10 [INFO] [stdout] | [INFO] [stdout] 282 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:307:15 [INFO] [stdout] | [INFO] [stdout] 307 | let val = gw.as_mut().unwrap().get_string_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:299:1 [INFO] [stdout] | [INFO] [stdout] 299 | / pub unsafe extern "C" fn fjage_param_get_string_array( [INFO] [stdout] 300 | | gw: *mut Gateway, [INFO] [stdout] 301 | | aid: *const c_char, [INFO] [stdout] 302 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 305 | | ndx: c_int, [INFO] [stdout] 306 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:308:10 [INFO] [stdout] | [INFO] [stdout] 308 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:309:10 [INFO] [stdout] | [INFO] [stdout] 309 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:324:32 [INFO] [stdout] | [INFO] [stdout] 324 | allocated_strings.push(c_api_alloc_cstr(str.to_string())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:337:5 [INFO] [stdout] | [INFO] [stdout] 337 | value.copy_from(allocated_strings.as_ptr(), len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:361:12 [INFO] [stdout] | [INFO] [stdout] 361 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:353:1 [INFO] [stdout] | [INFO] [stdout] 353 | / pub unsafe extern "C" fn fjage_param_set_int( [INFO] [stdout] 354 | | gw: *mut Gateway, [INFO] [stdout] 355 | | aid: *const c_char, [INFO] [stdout] 356 | | param: *const c_char, [INFO] [stdout] 357 | | value: c_int, [INFO] [stdout] 358 | | ndx: c_int, [INFO] [stdout] 359 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:384:12 [INFO] [stdout] | [INFO] [stdout] 384 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:376:1 [INFO] [stdout] | [INFO] [stdout] 376 | / pub unsafe extern "C" fn fjage_param_set_long( [INFO] [stdout] 377 | | gw: *mut Gateway, [INFO] [stdout] 378 | | aid: *const c_char, [INFO] [stdout] 379 | | param: *const c_char, [INFO] [stdout] 380 | | value: i64, [INFO] [stdout] 381 | | ndx: c_int, [INFO] [stdout] 382 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:407:12 [INFO] [stdout] | [INFO] [stdout] 407 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn fjage_param_set_float( [INFO] [stdout] 400 | | gw: *mut Gateway, [INFO] [stdout] 401 | | aid: *const c_char, [INFO] [stdout] 402 | | param: *const c_char, [INFO] [stdout] 403 | | value: c_float, [INFO] [stdout] 404 | | ndx: c_int, [INFO] [stdout] 405 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:422:12 [INFO] [stdout] | [INFO] [stdout] 422 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:414:1 [INFO] [stdout] | [INFO] [stdout] 414 | / pub unsafe extern "C" fn fjage_param_set_double( [INFO] [stdout] 415 | | gw: *mut Gateway, [INFO] [stdout] 416 | | aid: *const c_char, [INFO] [stdout] 417 | | param: *const c_char, [INFO] [stdout] 418 | | value: c_double, [INFO] [stdout] 419 | | ndx: c_int, [INFO] [stdout] 420 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:445:12 [INFO] [stdout] | [INFO] [stdout] 445 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:437:1 [INFO] [stdout] | [INFO] [stdout] 437 | / pub unsafe extern "C" fn fjage_param_set_bool( [INFO] [stdout] 438 | | gw: *mut Gateway, [INFO] [stdout] 439 | | aid: *const c_char, [INFO] [stdout] 440 | | param: *const c_char, [INFO] [stdout] 441 | | value: bool, [INFO] [stdout] 442 | | ndx: c_int, [INFO] [stdout] 443 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:468:12 [INFO] [stdout] | [INFO] [stdout] 468 | return c_api_set_param( [INFO] [stdout] | ____________^ [INFO] [stdout] 469 | | gw, [INFO] [stdout] 470 | | aid, [INFO] [stdout] 471 | | param, [INFO] [stdout] 472 | | Value::from(c_api_cstr_to_string(value)), [INFO] [stdout] 473 | | ndx, [INFO] [stdout] 474 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | / pub unsafe extern "C" fn fjage_param_set_string( [INFO] [stdout] 461 | | gw: *mut Gateway, [INFO] [stdout] 462 | | aid: *const c_char, [INFO] [stdout] 463 | | param: *const c_char, [INFO] [stdout] 464 | | value: *const c_char, [INFO] [stdout] 465 | | ndx: c_int, [INFO] [stdout] 466 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:472:21 [INFO] [stdout] | [INFO] [stdout] 472 | Value::from(c_api_cstr_to_string(value)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:489:12 [INFO] [stdout] | [INFO] [stdout] 489 | return c_api_set_param( [INFO] [stdout] | ____________^ [INFO] [stdout] 490 | | gw, [INFO] [stdout] 491 | | aid, [INFO] [stdout] 492 | | param, [INFO] [stdout] 493 | | Value::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] 494 | | ndx, [INFO] [stdout] 495 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn fjage_param_set_bool_array( [INFO] [stdout] 481 | | gw: *mut Gateway, [INFO] [stdout] 482 | | aid: *const c_char, [INFO] [stdout] 483 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 486 | | ndx: c_int, [INFO] [stdout] 487 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Value::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:508:18 [INFO] [stdout] | [INFO] [stdout] 508 | let result = gw.as_mut().unwrap().set_int_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:500:1 [INFO] [stdout] | [INFO] [stdout] 500 | / pub unsafe extern "C" fn fjage_param_set_int_array( [INFO] [stdout] 501 | | gw: *mut Gateway, [INFO] [stdout] 502 | | aid: *const c_char, [INFO] [stdout] 503 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 506 | | ndx: c_int, [INFO] [stdout] 507 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:509:10 [INFO] [stdout] | [INFO] [stdout] 509 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:510:10 [INFO] [stdout] | [INFO] [stdout] 510 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:511:19 [INFO] [stdout] | [INFO] [stdout] 511 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:533:18 [INFO] [stdout] | [INFO] [stdout] 533 | let result = gw.as_mut().unwrap().set_long_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:525:1 [INFO] [stdout] | [INFO] [stdout] 525 | / pub unsafe extern "C" fn fjage_param_set_long_array( [INFO] [stdout] 526 | | gw: *mut Gateway, [INFO] [stdout] 527 | | aid: *const c_char, [INFO] [stdout] 528 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 531 | | ndx: c_int, [INFO] [stdout] 532 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:534:10 [INFO] [stdout] | [INFO] [stdout] 534 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:535:10 [INFO] [stdout] | [INFO] [stdout] 535 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:536:19 [INFO] [stdout] | [INFO] [stdout] 536 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:557:18 [INFO] [stdout] | [INFO] [stdout] 557 | let result = gw.as_mut().unwrap().set_float_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:549:1 [INFO] [stdout] | [INFO] [stdout] 549 | / pub unsafe extern "C" fn fjage_param_set_float_array( [INFO] [stdout] 550 | | gw: *mut Gateway, [INFO] [stdout] 551 | | aid: *const c_char, [INFO] [stdout] 552 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 555 | | ndx: c_int, [INFO] [stdout] 556 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:558:10 [INFO] [stdout] | [INFO] [stdout] 558 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:559:10 [INFO] [stdout] | [INFO] [stdout] 559 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:560:19 [INFO] [stdout] | [INFO] [stdout] 560 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:583:18 [INFO] [stdout] | [INFO] [stdout] 583 | let result = gw.as_mut().unwrap().set_double_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:574:1 [INFO] [stdout] | [INFO] [stdout] 574 | / pub unsafe extern "C" fn fjage_param_set_double_array( [INFO] [stdout] 575 | | gw: *mut Gateway, [INFO] [stdout] 576 | | aid: *const c_char, [INFO] [stdout] 577 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 580 | | ndx: c_int, [INFO] [stdout] 581 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:584:10 [INFO] [stdout] | [INFO] [stdout] 584 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:585:10 [INFO] [stdout] | [INFO] [stdout] 585 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:586:19 [INFO] [stdout] | [INFO] [stdout] 586 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:22 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / pub unsafe extern "C" fn fjage_param_set_string_array( [INFO] [stdout] 601 | | gw: *mut Gateway, [INFO] [stdout] 602 | | aid: *const c_char, [INFO] [stdout] 603 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 606 | | ndx: c_int, [INFO] [stdout] 607 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:43 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:44 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:618:12 [INFO] [stdout] | [INFO] [stdout] 618 | return c_api_set_param(gw, aid, param, Value::from(str_vec), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:38:15 [INFO] [stdout] | [INFO] [stdout] 38 | let str = CStr::from_ptr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn c_api_cstr_to_string(str: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | let _aid_ptr: Box<&[u8]> = Box::from_raw(aid.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | pub unsafe fn c_api_free_cstr(aid: *mut c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:58:16 [INFO] [stdout] | [INFO] [stdout] 58 | let _msg = Box::from_raw(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:57:1 [INFO] [stdout] | [INFO] [stdout] 57 | pub unsafe fn c_api_free_msg(msg: *mut Message) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:111:23 [INFO] [stdout] | [INFO] [stdout] 111 | let str_ptr = c_api_alloc_cstr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | pub unsafe fn alloc_str(&mut self, str: String) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:116:23 [INFO] [stdout] | [INFO] [stdout] 116 | let str_ptr = c_api_alloc_cstr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn alloc_str_s(msg: *mut fjage_msg_t, str: String) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | msg.as_mut().unwrap().heap.push(str_ptr); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:124:20 [INFO] [stdout] | [INFO] [stdout] 124 | for str in msg.as_ref().unwrap().heap.iter() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | pub unsafe fn free(msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_free_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | c_api_free_cstr(str.cast_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:127:38 [INFO] [stdout] | [INFO] [stdout] 127 | let _msg: Box = Box::from_raw(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | gw.as_mut().unwrap().send( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:129:5 [INFO] [stdout] | [INFO] [stdout] 129 | pub unsafe fn send(gw: *mut Gateway, msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:131:13 [INFO] [stdout] | [INFO] [stdout] 131 | fjage_msg_t::strkey_get(msg, "recipient") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:134:13 [INFO] [stdout] | [INFO] [stdout] 134 | msg.as_mut().unwrap().msg.clone(), [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:143:19 [INFO] [stdout] | [INFO] [stdout] 143 | let req = msg.as_mut().unwrap().msg.clone(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | / pub unsafe fn request( [INFO] [stdout] 139 | | gw: *mut Gateway, [INFO] [stdout] 140 | | msg: *mut fjage_msg_t, [INFO] [stdout] 141 | | timeout: c_long, [INFO] [stdout] 142 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:144:19 [INFO] [stdout] | [INFO] [stdout] 144 | let rsp = gw.as_mut().unwrap().request_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:149:9 [INFO] [stdout] | [INFO] [stdout] 149 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:154:25 [INFO] [stdout] | [INFO] [stdout] 154 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | boxed_msg.as_mut().unwrap().msg = rsp.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:159:19 [INFO] [stdout] | [INFO] [stdout] 159 | let msg = msg.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:158:5 [INFO] [stdout] | [INFO] [stdout] 158 | pub unsafe fn set(msg: *mut fjage_msg_t, key: *const c_char, value: Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:162:19 [INFO] [stdout] | [INFO] [stdout] 162 | let key = c_api_cstr_to_string(key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_int_to_perf` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:169:29 [INFO] [stdout] | [INFO] [stdout] 169 | data.perf = c_api_int_to_perf(value.as_i64().unwrap() as c_int); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:193:16 [INFO] [stdout] | [INFO] [stdout] 193 | return fjage_msg_t::get(msg, key.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:191:5 [INFO] [stdout] | [INFO] [stdout] 191 | pub unsafe fn strkey_get(msg: *mut fjage_msg_t, key: &str) -> Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:197:16 [INFO] [stdout] | [INFO] [stdout] 197 | return fjage_msg_t::set(msg, key.as_ptr(), value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:195:5 [INFO] [stdout] | [INFO] [stdout] 195 | pub unsafe fn strkey_set(msg: *mut fjage_msg_t, key: &str, value: Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:200:19 [INFO] [stdout] | [INFO] [stdout] 200 | let msg = msg.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | pub unsafe fn get(msg: *mut fjage_msg_t, key: *const c_char) -> Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:203:19 [INFO] [stdout] | [INFO] [stdout] 203 | let key = c_api_cstr_to_string(key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_perf_to_int` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:209:37 [INFO] [stdout] | [INFO] [stdout] 209 | "perf" => Value::Number(c_api_perf_to_int(&data.perf).into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:246:15 [INFO] [stdout] | [INFO] [stdout] 246 | let val = gw.as_mut().unwrap().set_param( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:239:1 [INFO] [stdout] | [INFO] [stdout] 239 | / pub unsafe fn c_api_set_param( [INFO] [stdout] 240 | | gw: *mut Gateway, [INFO] [stdout] 241 | | aid: *const c_char, [INFO] [stdout] 242 | | param: *const c_char, [INFO] [stdout] 243 | | value: Value, [INFO] [stdout] 244 | | ndx: c_int, [INFO] [stdout] 245 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:247:10 [INFO] [stdout] | [INFO] [stdout] 247 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:248:10 [INFO] [stdout] | [INFO] [stdout] 248 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:269:15 [INFO] [stdout] | [INFO] [stdout] 269 | let val = gw.as_mut().unwrap().get_param( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:259:1 [INFO] [stdout] | [INFO] [stdout] 259 | / pub unsafe fn c_api_get_param( [INFO] [stdout] 260 | | gw: *mut Gateway, [INFO] [stdout] 261 | | aid: *const c_char, [INFO] [stdout] 262 | | param: *const c_char, [INFO] [stdout] 263 | | ndx: c_int, [INFO] [stdout] 264 | | ) -> Value { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:270:10 [INFO] [stdout] | [INFO] [stdout] 270 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:271:10 [INFO] [stdout] | [INFO] [stdout] 271 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:17:20 [INFO] [stdout] | [INFO] [stdout] 17 | let hostname = CStr::from_ptr(hostname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | pub unsafe extern "C" fn fjage_tcp_open(hostname: *const c_char, port: c_int) -> *mut Gateway { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `settings` [INFO] [stdout] --> src/ffi/mod.rs:37:5 [INFO] [stdout] | [INFO] [stdout] 37 | settings: *const c_char, [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:40:10 [INFO] [stdout] | [INFO] [stdout] 40 | &c_api_cstr_to_string(devname), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | / pub unsafe extern "C" fn fjage_rs232_open( [INFO] [stdout] 35 | | devname: *const c_char, [INFO] [stdout] 36 | | baud: c_int, [INFO] [stdout] 37 | | settings: *const c_char, [INFO] [stdout] 38 | | ) -> *mut Gateway { [INFO] [stdout] | |_________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `devname` [INFO] [stdout] --> src/ffi/mod.rs:57:5 [INFO] [stdout] | [INFO] [stdout] 57 | devname: *const c_char, [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_devname` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `baud` [INFO] [stdout] --> src/ffi/mod.rs:58:5 [INFO] [stdout] | [INFO] [stdout] 58 | baud: c_int, [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_baud` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `settings` [INFO] [stdout] --> src/ffi/mod.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | settings: *const c_char, [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut _gw = Box::from_raw(gw); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:74:1 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe extern "C" fn fjage_close(gw: *mut Gateway) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:89:15 [INFO] [stdout] | [INFO] [stdout] 89 | let aid = gw.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:88:1 [INFO] [stdout] | [INFO] [stdout] 88 | pub unsafe extern "C" fn fjage_get_agent_id(gw: *mut Gateway) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | return c_api_alloc_cstr(aid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:103:5 [INFO] [stdout] | [INFO] [stdout] 103 | gw.as_mut().unwrap().subscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:102:1 [INFO] [stdout] | [INFO] [stdout] 102 | pub unsafe extern "C" fn fjage_subscribe(gw: *mut Gateway, topic: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:103:37 [INFO] [stdout] | [INFO] [stdout] 103 | gw.as_mut().unwrap().subscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:116:5 [INFO] [stdout] | [INFO] [stdout] 116 | gw.as_mut() [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:115:1 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe extern "C" fn fjage_subscribe_agent(gw: *mut Gateway, aid: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:118:27 [INFO] [stdout] | [INFO] [stdout] 118 | .subscribe_agent(&c_api_cstr_to_string(aid)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | gw.as_mut() [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:130:1 [INFO] [stdout] | [INFO] [stdout] 130 | pub unsafe extern "C" fn fjage_unsubscribe(gw: *mut Gateway, topic: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | .unsubscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:146:12 [INFO] [stdout] | [INFO] [stdout] 146 | return gw [INFO] [stdout] | ____________^ [INFO] [stdout] 147 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:145:1 [INFO] [stdout] | [INFO] [stdout] 145 | pub unsafe extern "C" fn fjage_is_subscribed(gw: *mut Gateway, topic: *const c_char) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:149:25 [INFO] [stdout] | [INFO] [stdout] 149 | .is_subscribed(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:165:18 [INFO] [stdout] | [INFO] [stdout] 165 | let result = gw [INFO] [stdout] | __________________^ [INFO] [stdout] 166 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:161:1 [INFO] [stdout] | [INFO] [stdout] 161 | / pub unsafe extern "C" fn fjage_agent_for_service( [INFO] [stdout] 162 | | gw: *mut Gateway, [INFO] [stdout] 163 | | service: *const c_char, [INFO] [stdout] 164 | | ) -> *const c_char { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:168:29 [INFO] [stdout] | [INFO] [stdout] 168 | .agent_for_service(&c_api_cstr_to_string(service)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:172:12 [INFO] [stdout] | [INFO] [stdout] 172 | return c_api_alloc_cstr(result.unwrap()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:194:18 [INFO] [stdout] | [INFO] [stdout] 194 | let result = gw [INFO] [stdout] | __________________^ [INFO] [stdout] 195 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | / pub unsafe extern "C" fn fjage_agents_for_service( [INFO] [stdout] 189 | | gw: *mut Gateway, [INFO] [stdout] 190 | | service: *const c_char, [INFO] [stdout] 191 | | agents: *mut *mut c_char, [INFO] [stdout] 192 | | max: c_int, [INFO] [stdout] 193 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:197:30 [INFO] [stdout] | [INFO] [stdout] 197 | .agents_for_service(&c_api_cstr_to_string(service)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:210:28 [INFO] [stdout] | [INFO] [stdout] 210 | let curr_aid_ptr = curr_aid_ptr.add((n) as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | (*curr_aid_ptr) = c_api_alloc_cstr(String::from(str)).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:212:27 [INFO] [stdout] | [INFO] [stdout] 212 | (*curr_aid_ptr) = c_api_alloc_cstr(String::from(str)).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::send` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | fjage_msg_t::send(gw, msg); //auto-frees [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:227:1 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe extern "C" fn fjage_send(gw: *mut Gateway, msg: *mut fjage_msg_t) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:255:15 [INFO] [stdout] | [INFO] [stdout] 255 | let msg = gw.as_mut().unwrap().recv_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:249:1 [INFO] [stdout] | [INFO] [stdout] 249 | / pub unsafe extern "C" fn fjage_receive( [INFO] [stdout] 250 | | gw: *mut Gateway, [INFO] [stdout] 251 | | clazz: *const c_char, [INFO] [stdout] 252 | | id: *const c_char, [INFO] [stdout] 253 | | timeout: c_long, [INFO] [stdout] 254 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:259:23 [INFO] [stdout] | [INFO] [stdout] 259 | Some(vec![c_api_cstr_to_string(clazz)]) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:264:18 [INFO] [stdout] | [INFO] [stdout] 264 | Some(c_api_cstr_to_string(id)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:272:21 [INFO] [stdout] | [INFO] [stdout] 272 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:273:5 [INFO] [stdout] | [INFO] [stdout] 273 | boxed_msg.as_mut().unwrap().msg = msg.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:24 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | / pub unsafe extern "C" fn fjage_receive_any( [INFO] [stdout] 296 | | gw: *mut Gateway, [INFO] [stdout] 297 | | clazzes: *const *const c_char, [INFO] [stdout] 298 | | clazzlen: c_int, [INFO] [stdout] 299 | | timeout: c_long, [INFO] [stdout] 300 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:45 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:46 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:306:15 [INFO] [stdout] | [INFO] [stdout] 306 | let msg = gw.as_mut().unwrap().recv_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:316:5 [INFO] [stdout] | [INFO] [stdout] 316 | boxed_msg.as_mut().unwrap().msg = msg.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::request` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:340:12 [INFO] [stdout] | [INFO] [stdout] 340 | return fjage_msg_t::request(gw, request, timeout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:335:1 [INFO] [stdout] | [INFO] [stdout] 335 | / pub unsafe extern "C" fn fjage_request( [INFO] [stdout] 336 | | gw: *mut Gateway, [INFO] [stdout] 337 | | request: *mut fjage_msg_t, [INFO] [stdout] 338 | | timeout: c_long, [INFO] [stdout] 339 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:352:5 [INFO] [stdout] | [INFO] [stdout] 352 | gw.as_mut().unwrap().interrupt(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:351:1 [INFO] [stdout] | [INFO] [stdout] 351 | pub unsafe extern "C" fn fjage_interrupt(gw: *mut Gateway) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:365:12 [INFO] [stdout] | [INFO] [stdout] 365 | return c_api_alloc_cstr(c_api_cstr_to_string(name)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:364:1 [INFO] [stdout] | [INFO] [stdout] 364 | pub unsafe extern "C" fn fjage_aid_create(name: *const c_char) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:365:29 [INFO] [stdout] | [INFO] [stdout] 365 | return c_api_alloc_cstr(c_api_cstr_to_string(name)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:378:25 [INFO] [stdout] | [INFO] [stdout] 378 | aid_topic.push_str(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:376:1 [INFO] [stdout] | [INFO] [stdout] 376 | pub unsafe extern "C" fn fjage_aid_topic(topic: *const c_char) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:379:12 [INFO] [stdout] | [INFO] [stdout] 379 | return c_api_alloc_cstr(aid_topic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_free_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:390:5 [INFO] [stdout] | [INFO] [stdout] 390 | c_api_free_cstr(aid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:389:1 [INFO] [stdout] | [INFO] [stdout] 389 | pub unsafe extern "C" fn fjage_aid_destroy(aid: *mut c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of `async fn` in public traits is discouraged as auto trait bounds cannot be specified [INFO] [stdout] --> src/protocol/connector.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | async fn connect(&self) -> (UnboundedSender, UnboundedReceiver); [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: you can suppress this lint if you plan to use the trait only in your own code, or do not care about auto traits like `Send` on the `Future` [INFO] [stdout] = note: `#[warn(async_fn_in_trait)]` on by default [INFO] [stdout] help: you can alternatively desugar to a normal `fn` that returns `impl Future` and add any desired bounds such as `Send`, but these cannot be relaxed without a breaking API change [INFO] [stdout] | [INFO] [stdout] 12 - async fn connect(&self) -> (UnboundedSender, UnboundedReceiver); [INFO] [stdout] 12 + fn connect(&self) -> impl std::future::Future, UnboundedReceiver)> + Send; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 291 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `fjage_rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/ffi/mod.rs [INFO] [stderr] * src/ffi/util.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:6 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:22 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:38 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:56 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/ffi/util.rs:18:85 [INFO] [stderr] | [INFO] [stderr] 18 | ($msg:expr_2021, $key:expr_2021, $value:expr_2021, $maxlen:expr_2021, $type:ty, $map_fn:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unused variable: `settings` [INFO] [stderr] --> src/ffi/mod.rs:37:5 [INFO] [stderr] | [INFO] [stderr] 37 | settings: *const c_char, [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `devname` [INFO] [stderr] --> src/ffi/mod.rs:57:5 [INFO] [stderr] | [INFO] [stderr] 57 | devname: *const c_char, [INFO] [stderr] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_devname` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `baud` [INFO] [stderr] --> src/ffi/mod.rs:58:5 [INFO] [stderr] | [INFO] [stderr] 58 | baud: c_int, [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_baud` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `settings` [INFO] [stderr] --> src/ffi/mod.rs:59:5 [INFO] [stderr] | [INFO] [stderr] 59 | settings: *const c_char, [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stderr] [INFO] [stderr] error: aborting due to 5 previous errors; 4 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:24:3 [INFO] [stdout] | [INFO] [stdout] 24 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 24 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:39:3 [INFO] [stdout] | [INFO] [stdout] 39 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 39 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:61:3 [INFO] [stdout] | [INFO] [stdout] 61 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 61 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:89:3 [INFO] [stdout] | [INFO] [stdout] 89 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 89 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:105:3 [INFO] [stdout] | [INFO] [stdout] 105 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 105 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:121:3 [INFO] [stdout] | [INFO] [stdout] 121 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 121 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 131 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:196:3 [INFO] [stdout] | [INFO] [stdout] 196 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 196 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:215:3 [INFO] [stdout] | [INFO] [stdout] 215 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 215 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:228:3 [INFO] [stdout] | [INFO] [stdout] 228 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 228 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:247:3 [INFO] [stdout] | [INFO] [stdout] 247 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 247 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:279:3 [INFO] [stdout] | [INFO] [stdout] 279 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 279 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:292:3 [INFO] [stdout] | [INFO] [stdout] 292 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 292 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:310:3 [INFO] [stdout] | [INFO] [stdout] 310 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 310 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:325:3 [INFO] [stdout] | [INFO] [stdout] 325 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 325 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:346:3 [INFO] [stdout] | [INFO] [stdout] 346 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 346 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:366:3 [INFO] [stdout] | [INFO] [stdout] 366 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 366 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:383:3 [INFO] [stdout] | [INFO] [stdout] 383 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 383 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:400:3 [INFO] [stdout] | [INFO] [stdout] 400 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 400 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:427:3 [INFO] [stdout] | [INFO] [stdout] 427 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 427 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:469:3 [INFO] [stdout] | [INFO] [stdout] 469 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 469 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:481:3 [INFO] [stdout] | [INFO] [stdout] 481 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 481 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:503:3 [INFO] [stdout] | [INFO] [stdout] 503 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 503 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:515:3 [INFO] [stdout] | [INFO] [stdout] 515 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 515 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:86:3 [INFO] [stdout] | [INFO] [stdout] 86 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 86 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:130:3 [INFO] [stdout] | [INFO] [stdout] 130 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 130 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:161:3 [INFO] [stdout] | [INFO] [stdout] 161 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 161 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:193:3 [INFO] [stdout] | [INFO] [stdout] 193 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 193 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:219:3 [INFO] [stdout] | [INFO] [stdout] 219 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 219 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:245:3 [INFO] [stdout] | [INFO] [stdout] 245 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 245 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:271:3 [INFO] [stdout] | [INFO] [stdout] 271 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 271 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:298:3 [INFO] [stdout] | [INFO] [stdout] 298 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 298 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:352:3 [INFO] [stdout] | [INFO] [stdout] 352 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 352 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:413:3 [INFO] [stdout] | [INFO] [stdout] 413 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 413 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:436:3 [INFO] [stdout] | [INFO] [stdout] 436 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 436 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:459:3 [INFO] [stdout] | [INFO] [stdout] 459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:499:3 [INFO] [stdout] | [INFO] [stdout] 499 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 499 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:524:3 [INFO] [stdout] | [INFO] [stdout] 524 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 524 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:548:3 [INFO] [stdout] | [INFO] [stdout] 548 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 548 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:573:3 [INFO] [stdout] | [INFO] [stdout] 573 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 573 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:599:3 [INFO] [stdout] | [INFO] [stdout] 599 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 599 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:15:3 [INFO] [stdout] | [INFO] [stdout] 15 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 15 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:33:3 [INFO] [stdout] | [INFO] [stdout] 33 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:55:3 [INFO] [stdout] | [INFO] [stdout] 55 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 55 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:87:3 [INFO] [stdout] | [INFO] [stdout] 87 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 87 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 101 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:114:3 [INFO] [stdout] | [INFO] [stdout] 114 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 114 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:129:3 [INFO] [stdout] | [INFO] [stdout] 129 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 129 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:144:3 [INFO] [stdout] | [INFO] [stdout] 144 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 144 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:160:3 [INFO] [stdout] | [INFO] [stdout] 160 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 160 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:187:3 [INFO] [stdout] | [INFO] [stdout] 187 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 187 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:226:3 [INFO] [stdout] | [INFO] [stdout] 226 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 226 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:248:3 [INFO] [stdout] | [INFO] [stdout] 248 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 248 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:334:3 [INFO] [stdout] | [INFO] [stdout] 334 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 334 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:350:3 [INFO] [stdout] | [INFO] [stdout] 350 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 350 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:363:3 [INFO] [stdout] | [INFO] [stdout] 363 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 363 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:388:3 [INFO] [stdout] | [INFO] [stdout] 388 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 388 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:11 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr_2021, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:22 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr_2021, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:35 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr_2021, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:49 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr_2021, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/ffi/util.rs:18:73 [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 18 | ($msg:expr, $key:expr, $value:expr, $maxlen:expr, $type:ty, $map_fn:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:32:16 [INFO] [stdout] | [INFO] [stdout] 32 | if (bytes_read.is_err()) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_parens)]` on by default [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 32 - if (bytes_read.is_err()) { [INFO] [stdout] 32 + if bytes_read.is_err() { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:36:16 [INFO] [stdout] | [INFO] [stdout] 36 | if (bytes_read == 0) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 36 - if (bytes_read == 0) { [INFO] [stdout] 36 + if bytes_read == 0 { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:106:16 [INFO] [stdout] | [INFO] [stdout] 106 | if (bytes_read.is_err()) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 106 - if (bytes_read.is_err()) { [INFO] [stdout] 106 + if bytes_read.is_err() { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unnecessary parentheses around `if` condition [INFO] [stdout] --> src/protocol/connector.rs:113:16 [INFO] [stdout] | [INFO] [stdout] 113 | if (bytes_read == 0) { [INFO] [stdout] | ^ ^ [INFO] [stdout] | [INFO] [stdout] help: remove these parentheses [INFO] [stdout] | [INFO] [stdout] 113 - if (bytes_read == 0) { [INFO] [stdout] 113 + if bytes_read == 0 { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/protocol/connector.rs:27:57 [INFO] [stdout] | [INFO] [stdout] 27 | async fn read_task(stream: T, mut sender: UnboundedSender) { [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/protocol/connector.rs:101:57 [INFO] [stdout] | [INFO] [stdout] 101 | async fn read_task(stream: T, mut sender: UnboundedSender) { [INFO] [stdout] | ----^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:26:15 [INFO] [stdout] | [INFO] [stdout] 26 | let msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:25:1 [INFO] [stdout] | [INFO] [stdout] 25 | pub unsafe extern "C" fn fjage_msg_create(clazz: *mut c_char, perf: c_int) -> *mut fjage_msg_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:27:24 [INFO] [stdout] | [INFO] [stdout] 27 | let msg_ref = &mut msg.as_mut().unwrap().msg; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:28:21 [INFO] [stdout] | [INFO] [stdout] 28 | msg_ref.clazz = c_api_cstr_to_string(clazz); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_int_to_perf` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:29:25 [INFO] [stdout] | [INFO] [stdout] 29 | msg_ref.data.perf = c_api_int_to_perf(perf); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:40:1 [INFO] [stdout] | [INFO] [stdout] 40 | pub unsafe extern "C" fn fjage_msg_destroy(msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | fjage_msg_t::strkey_set(msg, "recipient", Value::String(c_api_cstr_to_string(aid))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | pub unsafe extern "C" fn fjage_msg_set_recipient(msg: *mut fjage_msg_t, aid: *const c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:52:61 [INFO] [stdout] | [INFO] [stdout] 52 | fjage_msg_t::strkey_set(msg, "recipient", Value::String(c_api_cstr_to_string(aid))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | msg.as_mut().unwrap().msg.data.inReplyTo = Some(c_api_cstr_to_string(id)); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:62:1 [INFO] [stdout] | [INFO] [stdout] 62 | pub unsafe extern "C" fn fjage_msg_set_in_reply_to(msg: *mut fjage_msg_t, id: *const c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:63:53 [INFO] [stdout] | [INFO] [stdout] 63 | msg.as_mut().unwrap().msg.data.inReplyTo = Some(c_api_cstr_to_string(id)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | fjage_msg_t::set(msg, key, Value::String(c_api_cstr_to_string(value))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:74:1 [INFO] [stdout] | [INFO] [stdout] 74 | / pub unsafe extern "C" fn fjage_msg_add_string( [INFO] [stdout] 75 | | msg: *mut fjage_msg_t, [INFO] [stdout] 76 | | key: *const c_char, [INFO] [stdout] 77 | | value: *const c_char, [INFO] [stdout] 78 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:79:46 [INFO] [stdout] | [INFO] [stdout] 79 | fjage_msg_t::set(msg, key, Value::String(c_api_cstr_to_string(value))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:90:1 [INFO] [stdout] | [INFO] [stdout] 90 | / pub unsafe extern "C" fn fjage_msg_add_int( [INFO] [stdout] 91 | | msg: *mut fjage_msg_t, [INFO] [stdout] 92 | | key: *const c_char, [INFO] [stdout] 93 | | value: c_int, [INFO] [stdout] 94 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:111:5 [INFO] [stdout] | [INFO] [stdout] 111 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:106:1 [INFO] [stdout] | [INFO] [stdout] 106 | / pub unsafe extern "C" fn fjage_msg_add_long( [INFO] [stdout] 107 | | msg: *mut fjage_msg_t, [INFO] [stdout] 108 | | key: *const c_char, [INFO] [stdout] 109 | | value: c_long, [INFO] [stdout] 110 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:127:5 [INFO] [stdout] | [INFO] [stdout] 127 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | / pub unsafe extern "C" fn fjage_msg_add_float( [INFO] [stdout] 123 | | msg: *mut fjage_msg_t, [INFO] [stdout] 124 | | key: *const c_char, [INFO] [stdout] 125 | | value: c_float, [INFO] [stdout] 126 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | fjage_msg_t::set(msg, key, Value::from(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:132:1 [INFO] [stdout] | [INFO] [stdout] 132 | / pub unsafe extern "C" fn fjage_msg_add_double( [INFO] [stdout] 133 | | msg: *mut fjage_msg_t, [INFO] [stdout] 134 | | key: *const c_char, [INFO] [stdout] 135 | | value: c_double, [INFO] [stdout] 136 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:153:5 [INFO] [stdout] | [INFO] [stdout] 153 | fjage_msg_t::set(msg, key, Value::Bool(value)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn fjage_msg_add_bool( [INFO] [stdout] 149 | | msg: *mut fjage_msg_t, [INFO] [stdout] 150 | | key: *const c_char, [INFO] [stdout] 151 | | value: bool, [INFO] [stdout] 152 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:171:15 [INFO] [stdout] | [INFO] [stdout] 171 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn fjage_msg_add_byte_array( [INFO] [stdout] 166 | | msg: *mut fjage_msg_t, [INFO] [stdout] 167 | | key: *const c_char, [INFO] [stdout] 168 | | value: *mut u8, [INFO] [stdout] 169 | | len: c_int, [INFO] [stdout] 170 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:191:15 [INFO] [stdout] | [INFO] [stdout] 191 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | / pub unsafe extern "C" fn fjage_msg_add_int_array( [INFO] [stdout] 186 | | msg: *mut fjage_msg_t, [INFO] [stdout] 187 | | key: *const c_char, [INFO] [stdout] 188 | | value: *mut i32, [INFO] [stdout] 189 | | len: c_int, [INFO] [stdout] 190 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:192:5 [INFO] [stdout] | [INFO] [stdout] 192 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:203:15 [INFO] [stdout] | [INFO] [stdout] 203 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:197:1 [INFO] [stdout] | [INFO] [stdout] 197 | / pub unsafe extern "C" fn fjage_msg_add_long_array( [INFO] [stdout] 198 | | msg: *mut fjage_msg_t, [INFO] [stdout] 199 | | key: *const c_char, [INFO] [stdout] 200 | | value: *const i64, [INFO] [stdout] 201 | | len: c_int, [INFO] [stdout] 202 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:204:5 [INFO] [stdout] | [INFO] [stdout] 204 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:222:15 [INFO] [stdout] | [INFO] [stdout] 222 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:216:1 [INFO] [stdout] | [INFO] [stdout] 216 | / pub unsafe extern "C" fn fjage_msg_add_float_array( [INFO] [stdout] 217 | | msg: *mut fjage_msg_t, [INFO] [stdout] 218 | | key: *const c_char, [INFO] [stdout] 219 | | value: *mut c_float, [INFO] [stdout] 220 | | len: c_int, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:223:5 [INFO] [stdout] | [INFO] [stdout] 223 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:235:15 [INFO] [stdout] | [INFO] [stdout] 235 | let arr = slice::from_raw_parts(value, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:229:1 [INFO] [stdout] | [INFO] [stdout] 229 | / pub unsafe extern "C" fn fjage_msg_add_double_array( [INFO] [stdout] 230 | | msg: *mut fjage_msg_t, [INFO] [stdout] 231 | | key: *const c_char, [INFO] [stdout] 232 | | value: *const c_double, [INFO] [stdout] 233 | | len: c_int, [INFO] [stdout] 234 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:236:5 [INFO] [stdout] | [INFO] [stdout] 236 | fjage_msg_t::set(msg, key, Value::from(arr)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:250:14 [INFO] [stdout] | [INFO] [stdout] 250 | let id = fjage_msg_t::strkey_get(msg, "msgID") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:248:1 [INFO] [stdout] | [INFO] [stdout] 248 | pub unsafe extern "C" fn fjage_msg_get_id(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:254:14 [INFO] [stdout] | [INFO] [stdout] 254 | let id = msg.as_mut().unwrap().alloc_str(id); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:254:14 [INFO] [stdout] | [INFO] [stdout] 254 | let id = msg.as_mut().unwrap().alloc_str(id); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:268:18 [INFO] [stdout] | [INFO] [stdout] 268 | let clazz = &msg.as_ref().unwrap().msg.clazz; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | pub unsafe extern "C" fn fjage_msg_get_clazz(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:269:17 [INFO] [stdout] | [INFO] [stdout] 269 | let clazz = msg.as_mut().unwrap().alloc_str(clazz.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:269:17 [INFO] [stdout] | [INFO] [stdout] 269 | let clazz = msg.as_mut().unwrap().alloc_str(clazz.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_perf_to_int` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:281:12 [INFO] [stdout] | [INFO] [stdout] 281 | return c_api_perf_to_int(&msg.as_ref().unwrap().msg.data.perf); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:280:1 [INFO] [stdout] | [INFO] [stdout] 280 | pub unsafe extern "C" fn fjage_msg_get_performative(msg: *mut fjage_msg_t) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:281:31 [INFO] [stdout] | [INFO] [stdout] 281 | return c_api_perf_to_int(&msg.as_ref().unwrap().msg.data.perf); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:294:22 [INFO] [stdout] | [INFO] [stdout] 294 | let recipient = &msg.as_ref().unwrap().msg.data.recipient; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:293:1 [INFO] [stdout] | [INFO] [stdout] 293 | pub unsafe extern "C" fn fjage_msg_get_recipient(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:298:21 [INFO] [stdout] | [INFO] [stdout] 298 | let recipient = msg.as_mut().unwrap().alloc_str(recipient.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:298:21 [INFO] [stdout] | [INFO] [stdout] 298 | let recipient = msg.as_mut().unwrap().alloc_str(recipient.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:312:19 [INFO] [stdout] | [INFO] [stdout] 312 | let sender = &msg.as_ref().unwrap().msg.data.sender; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:311:1 [INFO] [stdout] | [INFO] [stdout] 311 | pub unsafe extern "C" fn fjage_msg_get_sender(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:313:18 [INFO] [stdout] | [INFO] [stdout] 313 | let sender = msg.as_mut().unwrap().alloc_str(sender.clone()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:313:18 [INFO] [stdout] | [INFO] [stdout] 313 | let sender = msg.as_mut().unwrap().alloc_str(sender.clone()); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:327:16 [INFO] [stdout] | [INFO] [stdout] 327 | let irp = &msg.as_ref().unwrap().msg.data.inReplyTo; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:326:1 [INFO] [stdout] | [INFO] [stdout] 326 | pub unsafe extern "C" fn fjage_msg_get_in_reply_to(msg: *mut fjage_msg_t) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:332:15 [INFO] [stdout] | [INFO] [stdout] 332 | let irp = msg.as_mut().unwrap().alloc_str(irp); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:332:15 [INFO] [stdout] | [INFO] [stdout] 332 | let irp = msg.as_mut().unwrap().alloc_str(irp); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:351:13 [INFO] [stdout] | [INFO] [stdout] 351 | let x = fjage_msg_t::get(msg, key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:347:1 [INFO] [stdout] | [INFO] [stdout] 347 | / pub unsafe extern "C" fn fjage_msg_get_string( [INFO] [stdout] 348 | | msg: *mut fjage_msg_t, [INFO] [stdout] 349 | | key: *const c_char, [INFO] [stdout] 350 | | ) -> *const c_char { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc_str_s` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:355:12 [INFO] [stdout] | [INFO] [stdout] 355 | return fjage_msg_t::alloc_str_s(msg, x.as_str().unwrap_or("").to_string()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:372:12 [INFO] [stdout] | [INFO] [stdout] 372 | return fjage_msg_t::get(msg, key).as_i64().unwrap_or(defval as i64) as c_int; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:367:1 [INFO] [stdout] | [INFO] [stdout] 367 | / pub unsafe extern "C" fn fjage_msg_get_int( [INFO] [stdout] 368 | | msg: *mut fjage_msg_t, [INFO] [stdout] 369 | | key: *const c_char, [INFO] [stdout] 370 | | defval: c_int, [INFO] [stdout] 371 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:389:12 [INFO] [stdout] | [INFO] [stdout] 389 | return fjage_msg_t::get(msg, key).as_i64().unwrap_or(defval as i64) as c_long; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:384:1 [INFO] [stdout] | [INFO] [stdout] 384 | / pub unsafe extern "C" fn fjage_msg_get_long( [INFO] [stdout] 385 | | msg: *mut fjage_msg_t, [INFO] [stdout] 386 | | key: *const c_char, [INFO] [stdout] 387 | | defval: c_long, [INFO] [stdout] 388 | | ) -> c_long { [INFO] [stdout] | |___________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:406:12 [INFO] [stdout] | [INFO] [stdout] 406 | return fjage_msg_t::get(msg, key).as_f64().unwrap_or(defval as f64) as c_float; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:401:1 [INFO] [stdout] | [INFO] [stdout] 401 | / pub unsafe extern "C" fn fjage_msg_get_float( [INFO] [stdout] 402 | | msg: *mut fjage_msg_t, [INFO] [stdout] 403 | | key: *const c_char, [INFO] [stdout] 404 | | defval: c_float, [INFO] [stdout] 405 | | ) -> c_float { [INFO] [stdout] | |____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:416:12 [INFO] [stdout] | [INFO] [stdout] 416 | return fjage_msg_t::get(msg, key).as_f64().unwrap_or(defval as f64) as c_double; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn fjage_msg_get_double( [INFO] [stdout] 412 | | msg: *mut fjage_msg_t, [INFO] [stdout] 413 | | key: *const c_char, [INFO] [stdout] 414 | | defval: c_double, [INFO] [stdout] 415 | | ) -> c_double { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/message.rs:433:12 [INFO] [stdout] | [INFO] [stdout] 433 | return fjage_msg_t::get(msg, key).as_bool().unwrap_or(defval); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | / pub unsafe extern "C" fn fjage_msg_get_bool( [INFO] [stdout] 429 | | msg: *mut fjage_msg_t, [INFO] [stdout] 430 | | key: *const c_char, [INFO] [stdout] 431 | | defval: bool, [INFO] [stdout] 432 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:454:12 [INFO] [stdout] | [INFO] [stdout] 454 | return msg_get_array!(msg, key, value, maxlen, u8, |x| x.as_u64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 455 | | as u8); [INFO] [stdout] | |______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn fjage_msg_get_byte_array( [INFO] [stdout] 449 | | msg: *mut fjage_msg_t, [INFO] [stdout] 450 | | key: *const c_char, [INFO] [stdout] 451 | | value: *mut u8, [INFO] [stdout] 452 | | maxlen: c_int, [INFO] [stdout] 453 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:454:12 [INFO] [stdout] | [INFO] [stdout] 454 | return msg_get_array!(msg, key, value, maxlen, u8, |x| x.as_u64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 455 | | as u8); [INFO] [stdout] | |______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:476:12 [INFO] [stdout] | [INFO] [stdout] 476 | return msg_get_array!(msg, key, value, maxlen, i32, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 477 | | as i32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:470:1 [INFO] [stdout] | [INFO] [stdout] 470 | / pub unsafe extern "C" fn fjage_msg_get_int_array( [INFO] [stdout] 471 | | msg: *mut fjage_msg_t, [INFO] [stdout] 472 | | key: *const c_char, [INFO] [stdout] 473 | | value: *mut i32, [INFO] [stdout] 474 | | maxlen: c_int, [INFO] [stdout] 475 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:476:12 [INFO] [stdout] | [INFO] [stdout] 476 | return msg_get_array!(msg, key, value, maxlen, i32, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 477 | | as i32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:488:12 [INFO] [stdout] | [INFO] [stdout] 488 | return msg_get_array!(msg, key, value, maxlen, i64, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 489 | | as i64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:482:1 [INFO] [stdout] | [INFO] [stdout] 482 | / pub unsafe extern "C" fn fjage_msg_get_long_array( [INFO] [stdout] 483 | | msg: *mut fjage_msg_t, [INFO] [stdout] 484 | | key: *const c_char, [INFO] [stdout] 485 | | value: *mut i64, [INFO] [stdout] 486 | | maxlen: c_int, [INFO] [stdout] 487 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:488:12 [INFO] [stdout] | [INFO] [stdout] 488 | return msg_get_array!(msg, key, value, maxlen, i64, |x| x.as_i64().unwrap_or(0) [INFO] [stdout] | ____________- [INFO] [stdout] 489 | | as i64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:510:12 [INFO] [stdout] | [INFO] [stdout] 510 | return msg_get_array!(msg, key, value, maxlen, f32, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 511 | | as f32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:504:1 [INFO] [stdout] | [INFO] [stdout] 504 | / pub unsafe extern "C" fn fjage_msg_get_float_array( [INFO] [stdout] 505 | | msg: *mut fjage_msg_t, [INFO] [stdout] 506 | | key: *const c_char, [INFO] [stdout] 507 | | value: *mut f32, [INFO] [stdout] 508 | | maxlen: c_int, [INFO] [stdout] 509 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:510:12 [INFO] [stdout] | [INFO] [stdout] 510 | return msg_get_array!(msg, key, value, maxlen, f32, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 511 | | as f32); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:20:23 [INFO] [stdout] | [INFO] [stdout] 20 | let val = fjage_msg_t::get($msg, $key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:522:12 [INFO] [stdout] | [INFO] [stdout] 522 | return msg_get_array!(msg, key, value, maxlen, f64, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 523 | | as f64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/message.rs:516:1 [INFO] [stdout] | [INFO] [stdout] 516 | / pub unsafe extern "C" fn fjage_msg_get_double_array( [INFO] [stdout] 517 | | msg: *mut fjage_msg_t, [INFO] [stdout] 518 | | key: *const c_char, [INFO] [stdout] 519 | | value: *mut f64, [INFO] [stdout] 520 | | maxlen: c_int, [INFO] [stdout] 521 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:31:13 [INFO] [stdout] | [INFO] [stdout] 31 | $value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ffi/message.rs:522:12 [INFO] [stdout] | [INFO] [stdout] 522 | return msg_get_array!(msg, key, value, maxlen, f64, |x| x.as_f64().unwrap_or(0.0) [INFO] [stdout] | ____________- [INFO] [stdout] 523 | | as f64); [INFO] [stdout] | |_______________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `msg_get_array` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:40:15 [INFO] [stdout] | [INFO] [stdout] 40 | let val = gw.as_mut().unwrap().get_int( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | / pub unsafe extern "C" fn fjage_param_get_int( [INFO] [stdout] 24 | | gw: *mut Gateway, [INFO] [stdout] 25 | | aid: *const c_char, [INFO] [stdout] 26 | | param: *const c_char, [INFO] [stdout] 27 | | ndx: c_int, [INFO] [stdout] 28 | | defval: c_int, [INFO] [stdout] 29 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:41:10 [INFO] [stdout] | [INFO] [stdout] 41 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:42:10 [INFO] [stdout] | [INFO] [stdout] 42 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:67:15 [INFO] [stdout] | [INFO] [stdout] 67 | let val = gw.as_mut().unwrap().get_long( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:60:1 [INFO] [stdout] | [INFO] [stdout] 60 | / pub unsafe extern "C" fn fjage_param_get_long( [INFO] [stdout] 61 | | gw: *mut Gateway, [INFO] [stdout] 62 | | aid: *const c_char, [INFO] [stdout] 63 | | param: *const c_char, [INFO] [stdout] 64 | | ndx: c_int, [INFO] [stdout] 65 | | defval: i64, [INFO] [stdout] 66 | | ) -> i64 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:68:10 [INFO] [stdout] | [INFO] [stdout] 68 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:69:10 [INFO] [stdout] | [INFO] [stdout] 69 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:94:15 [INFO] [stdout] | [INFO] [stdout] 94 | let val = gw.as_mut().unwrap().get_float( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:87:1 [INFO] [stdout] | [INFO] [stdout] 87 | / pub unsafe extern "C" fn fjage_param_get_float( [INFO] [stdout] 88 | | gw: *mut Gateway, [INFO] [stdout] 89 | | aid: *const c_char, [INFO] [stdout] 90 | | param: *const c_char, [INFO] [stdout] 91 | | ndx: c_int, [INFO] [stdout] 92 | | defval: c_float, [INFO] [stdout] 93 | | ) -> c_float { [INFO] [stdout] | |____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:95:10 [INFO] [stdout] | [INFO] [stdout] 95 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:111:15 [INFO] [stdout] | [INFO] [stdout] 111 | let val = gw.as_mut().unwrap().get_double( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn fjage_param_get_double( [INFO] [stdout] 105 | | gw: *mut Gateway, [INFO] [stdout] 106 | | aid: *const c_char, [INFO] [stdout] 107 | | param: *const c_char, [INFO] [stdout] 108 | | ndx: c_int, [INFO] [stdout] 109 | | defval: c_double, [INFO] [stdout] 110 | | ) -> c_double { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:112:10 [INFO] [stdout] | [INFO] [stdout] 112 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:113:10 [INFO] [stdout] | [INFO] [stdout] 113 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:140:15 [INFO] [stdout] | [INFO] [stdout] 140 | let val = gw.as_mut().unwrap().get_bool( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:131:1 [INFO] [stdout] | [INFO] [stdout] 131 | / pub unsafe extern "C" fn fjage_param_get_bool( [INFO] [stdout] 132 | | gw: *mut Gateway, [INFO] [stdout] 133 | | aid: *const c_char, [INFO] [stdout] 134 | | param: *const c_char, [INFO] [stdout] 135 | | ndx: c_int, [INFO] [stdout] 136 | | defval: c_int, [INFO] [stdout] 137 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:141:10 [INFO] [stdout] | [INFO] [stdout] 141 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:142:10 [INFO] [stdout] | [INFO] [stdout] 142 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:170:15 [INFO] [stdout] | [INFO] [stdout] 170 | let val = gw.as_mut().unwrap().get_string( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:162:1 [INFO] [stdout] | [INFO] [stdout] 162 | / pub unsafe extern "C" fn fjage_param_get_string( [INFO] [stdout] 163 | | gw: *mut Gateway, [INFO] [stdout] 164 | | aid: *const c_char, [INFO] [stdout] 165 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 168 | | len: c_int, [INFO] [stdout] 169 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:171:10 [INFO] [stdout] | [INFO] [stdout] 171 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:172:10 [INFO] [stdout] | [INFO] [stdout] 172 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::copy_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | val.as_str().as_ptr().copy_to(strval.cast(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:202:15 [INFO] [stdout] | [INFO] [stdout] 202 | let val = gw.as_mut().unwrap().get_int_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:194:1 [INFO] [stdout] | [INFO] [stdout] 194 | / pub unsafe extern "C" fn fjage_param_get_int_array( [INFO] [stdout] 195 | | gw: *mut Gateway, [INFO] [stdout] 196 | | aid: *const c_char, [INFO] [stdout] 197 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 200 | | ndx: c_int, [INFO] [stdout] 201 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:203:10 [INFO] [stdout] | [INFO] [stdout] 203 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:204:10 [INFO] [stdout] | [INFO] [stdout] 204 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:214:5 [INFO] [stdout] | [INFO] [stdout] 214 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:228:15 [INFO] [stdout] | [INFO] [stdout] 228 | let val = gw.as_mut().unwrap().get_long_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:220:1 [INFO] [stdout] | [INFO] [stdout] 220 | / pub unsafe extern "C" fn fjage_param_get_long_array( [INFO] [stdout] 221 | | gw: *mut Gateway, [INFO] [stdout] 222 | | aid: *const c_char, [INFO] [stdout] 223 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 226 | | ndx: c_int, [INFO] [stdout] 227 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:229:10 [INFO] [stdout] | [INFO] [stdout] 229 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:230:10 [INFO] [stdout] | [INFO] [stdout] 230 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:240:5 [INFO] [stdout] | [INFO] [stdout] 240 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:254:15 [INFO] [stdout] | [INFO] [stdout] 254 | let val = gw.as_mut().unwrap().get_float_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:246:1 [INFO] [stdout] | [INFO] [stdout] 246 | / pub unsafe extern "C" fn fjage_param_get_float_array( [INFO] [stdout] 247 | | gw: *mut Gateway, [INFO] [stdout] 248 | | aid: *const c_char, [INFO] [stdout] 249 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 252 | | ndx: c_int, [INFO] [stdout] 253 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:255:10 [INFO] [stdout] | [INFO] [stdout] 255 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:256:10 [INFO] [stdout] | [INFO] [stdout] 256 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:280:15 [INFO] [stdout] | [INFO] [stdout] 280 | let val = gw.as_mut().unwrap().get_double_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:272:1 [INFO] [stdout] | [INFO] [stdout] 272 | / pub unsafe extern "C" fn fjage_param_get_double_array( [INFO] [stdout] 273 | | gw: *mut Gateway, [INFO] [stdout] 274 | | aid: *const c_char, [INFO] [stdout] 275 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 278 | | ndx: c_int, [INFO] [stdout] 279 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:281:10 [INFO] [stdout] | [INFO] [stdout] 281 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:282:10 [INFO] [stdout] | [INFO] [stdout] 282 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | value.copy_from(val.as_ptr(), copy_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:307:15 [INFO] [stdout] | [INFO] [stdout] 307 | let val = gw.as_mut().unwrap().get_string_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:299:1 [INFO] [stdout] | [INFO] [stdout] 299 | / pub unsafe extern "C" fn fjage_param_get_string_array( [INFO] [stdout] 300 | | gw: *mut Gateway, [INFO] [stdout] 301 | | aid: *const c_char, [INFO] [stdout] 302 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 305 | | ndx: c_int, [INFO] [stdout] 306 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:308:10 [INFO] [stdout] | [INFO] [stdout] 308 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:309:10 [INFO] [stdout] | [INFO] [stdout] 309 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:324:32 [INFO] [stdout] | [INFO] [stdout] 324 | allocated_strings.push(c_api_alloc_cstr(str.to_string())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::copy_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:337:5 [INFO] [stdout] | [INFO] [stdout] 337 | value.copy_from(allocated_strings.as_ptr(), len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:361:12 [INFO] [stdout] | [INFO] [stdout] 361 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:353:1 [INFO] [stdout] | [INFO] [stdout] 353 | / pub unsafe extern "C" fn fjage_param_set_int( [INFO] [stdout] 354 | | gw: *mut Gateway, [INFO] [stdout] 355 | | aid: *const c_char, [INFO] [stdout] 356 | | param: *const c_char, [INFO] [stdout] 357 | | value: c_int, [INFO] [stdout] 358 | | ndx: c_int, [INFO] [stdout] 359 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:384:12 [INFO] [stdout] | [INFO] [stdout] 384 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:376:1 [INFO] [stdout] | [INFO] [stdout] 376 | / pub unsafe extern "C" fn fjage_param_set_long( [INFO] [stdout] 377 | | gw: *mut Gateway, [INFO] [stdout] 378 | | aid: *const c_char, [INFO] [stdout] 379 | | param: *const c_char, [INFO] [stdout] 380 | | value: i64, [INFO] [stdout] 381 | | ndx: c_int, [INFO] [stdout] 382 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:407:12 [INFO] [stdout] | [INFO] [stdout] 407 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn fjage_param_set_float( [INFO] [stdout] 400 | | gw: *mut Gateway, [INFO] [stdout] 401 | | aid: *const c_char, [INFO] [stdout] 402 | | param: *const c_char, [INFO] [stdout] 403 | | value: c_float, [INFO] [stdout] 404 | | ndx: c_int, [INFO] [stdout] 405 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:422:12 [INFO] [stdout] | [INFO] [stdout] 422 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:414:1 [INFO] [stdout] | [INFO] [stdout] 414 | / pub unsafe extern "C" fn fjage_param_set_double( [INFO] [stdout] 415 | | gw: *mut Gateway, [INFO] [stdout] 416 | | aid: *const c_char, [INFO] [stdout] 417 | | param: *const c_char, [INFO] [stdout] 418 | | value: c_double, [INFO] [stdout] 419 | | ndx: c_int, [INFO] [stdout] 420 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:445:12 [INFO] [stdout] | [INFO] [stdout] 445 | return c_api_set_param(gw, aid, param, Value::from(value), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:437:1 [INFO] [stdout] | [INFO] [stdout] 437 | / pub unsafe extern "C" fn fjage_param_set_bool( [INFO] [stdout] 438 | | gw: *mut Gateway, [INFO] [stdout] 439 | | aid: *const c_char, [INFO] [stdout] 440 | | param: *const c_char, [INFO] [stdout] 441 | | value: bool, [INFO] [stdout] 442 | | ndx: c_int, [INFO] [stdout] 443 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:468:12 [INFO] [stdout] | [INFO] [stdout] 468 | return c_api_set_param( [INFO] [stdout] | ____________^ [INFO] [stdout] 469 | | gw, [INFO] [stdout] 470 | | aid, [INFO] [stdout] 471 | | param, [INFO] [stdout] 472 | | Value::from(c_api_cstr_to_string(value)), [INFO] [stdout] 473 | | ndx, [INFO] [stdout] 474 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | / pub unsafe extern "C" fn fjage_param_set_string( [INFO] [stdout] 461 | | gw: *mut Gateway, [INFO] [stdout] 462 | | aid: *const c_char, [INFO] [stdout] 463 | | param: *const c_char, [INFO] [stdout] 464 | | value: *const c_char, [INFO] [stdout] 465 | | ndx: c_int, [INFO] [stdout] 466 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:472:21 [INFO] [stdout] | [INFO] [stdout] 472 | Value::from(c_api_cstr_to_string(value)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:489:12 [INFO] [stdout] | [INFO] [stdout] 489 | return c_api_set_param( [INFO] [stdout] | ____________^ [INFO] [stdout] 490 | | gw, [INFO] [stdout] 491 | | aid, [INFO] [stdout] 492 | | param, [INFO] [stdout] 493 | | Value::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] 494 | | ndx, [INFO] [stdout] 495 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn fjage_param_set_bool_array( [INFO] [stdout] 481 | | gw: *mut Gateway, [INFO] [stdout] 482 | | aid: *const c_char, [INFO] [stdout] 483 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 486 | | ndx: c_int, [INFO] [stdout] 487 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | Value::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:508:18 [INFO] [stdout] | [INFO] [stdout] 508 | let result = gw.as_mut().unwrap().set_int_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:500:1 [INFO] [stdout] | [INFO] [stdout] 500 | / pub unsafe extern "C" fn fjage_param_set_int_array( [INFO] [stdout] 501 | | gw: *mut Gateway, [INFO] [stdout] 502 | | aid: *const c_char, [INFO] [stdout] 503 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 506 | | ndx: c_int, [INFO] [stdout] 507 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:509:10 [INFO] [stdout] | [INFO] [stdout] 509 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:510:10 [INFO] [stdout] | [INFO] [stdout] 510 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:511:19 [INFO] [stdout] | [INFO] [stdout] 511 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:533:18 [INFO] [stdout] | [INFO] [stdout] 533 | let result = gw.as_mut().unwrap().set_long_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:525:1 [INFO] [stdout] | [INFO] [stdout] 525 | / pub unsafe extern "C" fn fjage_param_set_long_array( [INFO] [stdout] 526 | | gw: *mut Gateway, [INFO] [stdout] 527 | | aid: *const c_char, [INFO] [stdout] 528 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 531 | | ndx: c_int, [INFO] [stdout] 532 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:534:10 [INFO] [stdout] | [INFO] [stdout] 534 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:535:10 [INFO] [stdout] | [INFO] [stdout] 535 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:536:19 [INFO] [stdout] | [INFO] [stdout] 536 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:557:18 [INFO] [stdout] | [INFO] [stdout] 557 | let result = gw.as_mut().unwrap().set_float_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:549:1 [INFO] [stdout] | [INFO] [stdout] 549 | / pub unsafe extern "C" fn fjage_param_set_float_array( [INFO] [stdout] 550 | | gw: *mut Gateway, [INFO] [stdout] 551 | | aid: *const c_char, [INFO] [stdout] 552 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 555 | | ndx: c_int, [INFO] [stdout] 556 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:558:10 [INFO] [stdout] | [INFO] [stdout] 558 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:559:10 [INFO] [stdout] | [INFO] [stdout] 559 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:560:19 [INFO] [stdout] | [INFO] [stdout] 560 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:583:18 [INFO] [stdout] | [INFO] [stdout] 583 | let result = gw.as_mut().unwrap().set_double_array( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:574:1 [INFO] [stdout] | [INFO] [stdout] 574 | / pub unsafe extern "C" fn fjage_param_set_double_array( [INFO] [stdout] 575 | | gw: *mut Gateway, [INFO] [stdout] 576 | | aid: *const c_char, [INFO] [stdout] 577 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 580 | | ndx: c_int, [INFO] [stdout] 581 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:584:10 [INFO] [stdout] | [INFO] [stdout] 584 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:585:10 [INFO] [stdout] | [INFO] [stdout] 585 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:586:19 [INFO] [stdout] | [INFO] [stdout] 586 | Vec::from(slice::from_raw_parts(value, len as usize)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:22 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/param.rs:600:1 [INFO] [stdout] | [INFO] [stdout] 600 | / pub unsafe extern "C" fn fjage_param_set_string_array( [INFO] [stdout] 601 | | gw: *mut Gateway, [INFO] [stdout] 602 | | aid: *const c_char, [INFO] [stdout] 603 | | param: *const c_char, [INFO] [stdout] ... | [INFO] [stdout] 606 | | ndx: c_int, [INFO] [stdout] 607 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:43 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:616:44 [INFO] [stdout] | [INFO] [stdout] 616 | str_vec.push(c_api_cstr_to_string(*value.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_set_param` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/param.rs:618:12 [INFO] [stdout] | [INFO] [stdout] 618 | return c_api_set_param(gw, aid, param, Value::from(str_vec), ndx); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:38:15 [INFO] [stdout] | [INFO] [stdout] 38 | let str = CStr::from_ptr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn c_api_cstr_to_string(str: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | let _aid_ptr: Box<&[u8]> = Box::from_raw(aid.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | pub unsafe fn c_api_free_cstr(aid: *mut c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:58:16 [INFO] [stdout] | [INFO] [stdout] 58 | let _msg = Box::from_raw(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:57:1 [INFO] [stdout] | [INFO] [stdout] 57 | pub unsafe fn c_api_free_msg(msg: *mut Message) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:111:23 [INFO] [stdout] | [INFO] [stdout] 111 | let str_ptr = c_api_alloc_cstr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:110:5 [INFO] [stdout] | [INFO] [stdout] 110 | pub unsafe fn alloc_str(&mut self, str: String) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:116:23 [INFO] [stdout] | [INFO] [stdout] 116 | let str_ptr = c_api_alloc_cstr(str); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn alloc_str_s(msg: *mut fjage_msg_t, str: String) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | msg.as_mut().unwrap().heap.push(str_ptr); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:124:20 [INFO] [stdout] | [INFO] [stdout] 124 | for str in msg.as_ref().unwrap().heap.iter() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | pub unsafe fn free(msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_free_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | c_api_free_cstr(str.cast_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:127:38 [INFO] [stdout] | [INFO] [stdout] 127 | let _msg: Box = Box::from_raw(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | gw.as_mut().unwrap().send( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:129:5 [INFO] [stdout] | [INFO] [stdout] 129 | pub unsafe fn send(gw: *mut Gateway, msg: *mut fjage_msg_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::strkey_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:131:13 [INFO] [stdout] | [INFO] [stdout] 131 | fjage_msg_t::strkey_get(msg, "recipient") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:134:13 [INFO] [stdout] | [INFO] [stdout] 134 | msg.as_mut().unwrap().msg.clone(), [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:143:19 [INFO] [stdout] | [INFO] [stdout] 143 | let req = msg.as_mut().unwrap().msg.clone(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | / pub unsafe fn request( [INFO] [stdout] 139 | | gw: *mut Gateway, [INFO] [stdout] 140 | | msg: *mut fjage_msg_t, [INFO] [stdout] 141 | | timeout: c_long, [INFO] [stdout] 142 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:144:19 [INFO] [stdout] | [INFO] [stdout] 144 | let rsp = gw.as_mut().unwrap().request_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::free` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:149:9 [INFO] [stdout] | [INFO] [stdout] 149 | fjage_msg_t::free(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:154:25 [INFO] [stdout] | [INFO] [stdout] 154 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | boxed_msg.as_mut().unwrap().msg = rsp.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:159:19 [INFO] [stdout] | [INFO] [stdout] 159 | let msg = msg.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:158:5 [INFO] [stdout] | [INFO] [stdout] 158 | pub unsafe fn set(msg: *mut fjage_msg_t, key: *const c_char, value: Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:162:19 [INFO] [stdout] | [INFO] [stdout] 162 | let key = c_api_cstr_to_string(key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_int_to_perf` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:169:29 [INFO] [stdout] | [INFO] [stdout] 169 | data.perf = c_api_int_to_perf(value.as_i64().unwrap() as c_int); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:193:16 [INFO] [stdout] | [INFO] [stdout] 193 | return fjage_msg_t::get(msg, key.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:191:5 [INFO] [stdout] | [INFO] [stdout] 191 | pub unsafe fn strkey_get(msg: *mut fjage_msg_t, key: &str) -> Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:197:16 [INFO] [stdout] | [INFO] [stdout] 197 | return fjage_msg_t::set(msg, key.as_ptr(), value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:195:5 [INFO] [stdout] | [INFO] [stdout] 195 | pub unsafe fn strkey_set(msg: *mut fjage_msg_t, key: &str, value: Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:200:19 [INFO] [stdout] | [INFO] [stdout] 200 | let msg = msg.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | pub unsafe fn get(msg: *mut fjage_msg_t, key: *const c_char) -> Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:203:19 [INFO] [stdout] | [INFO] [stdout] 203 | let key = c_api_cstr_to_string(key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_perf_to_int` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:209:37 [INFO] [stdout] | [INFO] [stdout] 209 | "perf" => Value::Number(c_api_perf_to_int(&data.perf).into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:246:15 [INFO] [stdout] | [INFO] [stdout] 246 | let val = gw.as_mut().unwrap().set_param( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:239:1 [INFO] [stdout] | [INFO] [stdout] 239 | / pub unsafe fn c_api_set_param( [INFO] [stdout] 240 | | gw: *mut Gateway, [INFO] [stdout] 241 | | aid: *const c_char, [INFO] [stdout] 242 | | param: *const c_char, [INFO] [stdout] 243 | | value: Value, [INFO] [stdout] 244 | | ndx: c_int, [INFO] [stdout] 245 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:247:10 [INFO] [stdout] | [INFO] [stdout] 247 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:248:10 [INFO] [stdout] | [INFO] [stdout] 248 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:269:15 [INFO] [stdout] | [INFO] [stdout] 269 | let val = gw.as_mut().unwrap().get_param( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/util.rs:259:1 [INFO] [stdout] | [INFO] [stdout] 259 | / pub unsafe fn c_api_get_param( [INFO] [stdout] 260 | | gw: *mut Gateway, [INFO] [stdout] 261 | | aid: *const c_char, [INFO] [stdout] 262 | | param: *const c_char, [INFO] [stdout] 263 | | ndx: c_int, [INFO] [stdout] 264 | | ) -> Value { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:270:10 [INFO] [stdout] | [INFO] [stdout] 270 | &c_api_cstr_to_string(aid), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/util.rs:271:10 [INFO] [stdout] | [INFO] [stdout] 271 | &c_api_cstr_to_string(param), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:17:20 [INFO] [stdout] | [INFO] [stdout] 17 | let hostname = CStr::from_ptr(hostname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | pub unsafe extern "C" fn fjage_tcp_open(hostname: *const c_char, port: c_int) -> *mut Gateway { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `settings` [INFO] [stdout] --> src/ffi/mod.rs:37:5 [INFO] [stdout] | [INFO] [stdout] 37 | settings: *const c_char, [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:40:10 [INFO] [stdout] | [INFO] [stdout] 40 | &c_api_cstr_to_string(devname), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | / pub unsafe extern "C" fn fjage_rs232_open( [INFO] [stdout] 35 | | devname: *const c_char, [INFO] [stdout] 36 | | baud: c_int, [INFO] [stdout] 37 | | settings: *const c_char, [INFO] [stdout] 38 | | ) -> *mut Gateway { [INFO] [stdout] | |_________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `devname` [INFO] [stdout] --> src/ffi/mod.rs:57:5 [INFO] [stdout] | [INFO] [stdout] 57 | devname: *const c_char, [INFO] [stdout] | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_devname` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `baud` [INFO] [stdout] --> src/ffi/mod.rs:58:5 [INFO] [stdout] | [INFO] [stdout] 58 | baud: c_int, [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_baud` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `settings` [INFO] [stdout] --> src/ffi/mod.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | settings: *const c_char, [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_settings` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:75:19 [INFO] [stdout] | [INFO] [stdout] 75 | let mut _gw = Box::from_raw(gw); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:74:1 [INFO] [stdout] | [INFO] [stdout] 74 | pub unsafe extern "C" fn fjage_close(gw: *mut Gateway) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:89:15 [INFO] [stdout] | [INFO] [stdout] 89 | let aid = gw.as_mut().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:88:1 [INFO] [stdout] | [INFO] [stdout] 88 | pub unsafe extern "C" fn fjage_get_agent_id(gw: *mut Gateway) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | return c_api_alloc_cstr(aid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:103:5 [INFO] [stdout] | [INFO] [stdout] 103 | gw.as_mut().unwrap().subscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:102:1 [INFO] [stdout] | [INFO] [stdout] 102 | pub unsafe extern "C" fn fjage_subscribe(gw: *mut Gateway, topic: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:103:37 [INFO] [stdout] | [INFO] [stdout] 103 | gw.as_mut().unwrap().subscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:116:5 [INFO] [stdout] | [INFO] [stdout] 116 | gw.as_mut() [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:115:1 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe extern "C" fn fjage_subscribe_agent(gw: *mut Gateway, aid: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:118:27 [INFO] [stdout] | [INFO] [stdout] 118 | .subscribe_agent(&c_api_cstr_to_string(aid)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | gw.as_mut() [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:130:1 [INFO] [stdout] | [INFO] [stdout] 130 | pub unsafe extern "C" fn fjage_unsubscribe(gw: *mut Gateway, topic: *const c_char) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:133:23 [INFO] [stdout] | [INFO] [stdout] 133 | .unsubscribe(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:146:12 [INFO] [stdout] | [INFO] [stdout] 146 | return gw [INFO] [stdout] | ____________^ [INFO] [stdout] 147 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:145:1 [INFO] [stdout] | [INFO] [stdout] 145 | pub unsafe extern "C" fn fjage_is_subscribed(gw: *mut Gateway, topic: *const c_char) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:149:25 [INFO] [stdout] | [INFO] [stdout] 149 | .is_subscribed(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:165:18 [INFO] [stdout] | [INFO] [stdout] 165 | let result = gw [INFO] [stdout] | __________________^ [INFO] [stdout] 166 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:161:1 [INFO] [stdout] | [INFO] [stdout] 161 | / pub unsafe extern "C" fn fjage_agent_for_service( [INFO] [stdout] 162 | | gw: *mut Gateway, [INFO] [stdout] 163 | | service: *const c_char, [INFO] [stdout] 164 | | ) -> *const c_char { [INFO] [stdout] | |__________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:168:29 [INFO] [stdout] | [INFO] [stdout] 168 | .agent_for_service(&c_api_cstr_to_string(service)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:172:12 [INFO] [stdout] | [INFO] [stdout] 172 | return c_api_alloc_cstr(result.unwrap()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:194:18 [INFO] [stdout] | [INFO] [stdout] 194 | let result = gw [INFO] [stdout] | __________________^ [INFO] [stdout] 195 | | .as_mut() [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | / pub unsafe extern "C" fn fjage_agents_for_service( [INFO] [stdout] 189 | | gw: *mut Gateway, [INFO] [stdout] 190 | | service: *const c_char, [INFO] [stdout] 191 | | agents: *mut *mut c_char, [INFO] [stdout] 192 | | max: c_int, [INFO] [stdout] 193 | | ) -> c_int { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:197:30 [INFO] [stdout] | [INFO] [stdout] 197 | .agents_for_service(&c_api_cstr_to_string(service)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:210:28 [INFO] [stdout] | [INFO] [stdout] 210 | let curr_aid_ptr = curr_aid_ptr.add((n) as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:212:9 [INFO] [stdout] | [INFO] [stdout] 212 | (*curr_aid_ptr) = c_api_alloc_cstr(String::from(str)).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:212:27 [INFO] [stdout] | [INFO] [stdout] 212 | (*curr_aid_ptr) = c_api_alloc_cstr(String::from(str)).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::send` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:228:5 [INFO] [stdout] | [INFO] [stdout] 228 | fjage_msg_t::send(gw, msg); //auto-frees [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:227:1 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe extern "C" fn fjage_send(gw: *mut Gateway, msg: *mut fjage_msg_t) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:255:15 [INFO] [stdout] | [INFO] [stdout] 255 | let msg = gw.as_mut().unwrap().recv_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:249:1 [INFO] [stdout] | [INFO] [stdout] 249 | / pub unsafe extern "C" fn fjage_receive( [INFO] [stdout] 250 | | gw: *mut Gateway, [INFO] [stdout] 251 | | clazz: *const c_char, [INFO] [stdout] 252 | | id: *const c_char, [INFO] [stdout] 253 | | timeout: c_long, [INFO] [stdout] 254 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:259:23 [INFO] [stdout] | [INFO] [stdout] 259 | Some(vec![c_api_cstr_to_string(clazz)]) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:264:18 [INFO] [stdout] | [INFO] [stdout] 264 | Some(c_api_cstr_to_string(id)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:272:21 [INFO] [stdout] | [INFO] [stdout] 272 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:273:5 [INFO] [stdout] | [INFO] [stdout] 273 | boxed_msg.as_mut().unwrap().msg = msg.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:24 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | / pub unsafe extern "C" fn fjage_receive_any( [INFO] [stdout] 296 | | gw: *mut Gateway, [INFO] [stdout] 297 | | clazzes: *const *const c_char, [INFO] [stdout] 298 | | clazzlen: c_int, [INFO] [stdout] 299 | | timeout: c_long, [INFO] [stdout] 300 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:45 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:303:46 [INFO] [stdout] | [INFO] [stdout] 303 | clazzlist.push(c_api_cstr_to_string(*clazzes.add(i as usize))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:306:15 [INFO] [stdout] | [INFO] [stdout] 306 | let msg = gw.as_mut().unwrap().recv_timeout( [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | let boxed_msg = fjage_msg_t::alloc(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:316:5 [INFO] [stdout] | [INFO] [stdout] 316 | boxed_msg.as_mut().unwrap().msg = msg.unwrap(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::fjage_msg_t::request` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:340:12 [INFO] [stdout] | [INFO] [stdout] 340 | return fjage_msg_t::request(gw, request, timeout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:335:1 [INFO] [stdout] | [INFO] [stdout] 335 | / pub unsafe extern "C" fn fjage_request( [INFO] [stdout] 336 | | gw: *mut Gateway, [INFO] [stdout] 337 | | request: *mut fjage_msg_t, [INFO] [stdout] 338 | | timeout: c_long, [INFO] [stdout] 339 | | ) -> *const fjage_msg_t { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:352:5 [INFO] [stdout] | [INFO] [stdout] 352 | gw.as_mut().unwrap().interrupt(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:351:1 [INFO] [stdout] | [INFO] [stdout] 351 | pub unsafe extern "C" fn fjage_interrupt(gw: *mut Gateway) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:365:12 [INFO] [stdout] | [INFO] [stdout] 365 | return c_api_alloc_cstr(c_api_cstr_to_string(name)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:364:1 [INFO] [stdout] | [INFO] [stdout] 364 | pub unsafe extern "C" fn fjage_aid_create(name: *const c_char) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:365:29 [INFO] [stdout] | [INFO] [stdout] 365 | return c_api_alloc_cstr(c_api_cstr_to_string(name)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_cstr_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:378:25 [INFO] [stdout] | [INFO] [stdout] 378 | aid_topic.push_str(&c_api_cstr_to_string(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:376:1 [INFO] [stdout] | [INFO] [stdout] 376 | pub unsafe extern "C" fn fjage_aid_topic(topic: *const c_char) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_alloc_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:379:12 [INFO] [stdout] | [INFO] [stdout] 379 | return c_api_alloc_cstr(aid_topic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `ffi::util::c_api_free_cstr` is unsafe and requires unsafe block [INFO] [stdout] --> src/ffi/mod.rs:390:5 [INFO] [stdout] | [INFO] [stdout] 390 | c_api_free_cstr(aid); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/ffi/mod.rs:389:1 [INFO] [stdout] | [INFO] [stdout] 389 | pub unsafe extern "C" fn fjage_aid_destroy(aid: *mut c_char) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of `async fn` in public traits is discouraged as auto trait bounds cannot be specified [INFO] [stdout] --> src/protocol/connector.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | async fn connect(&self) -> (UnboundedSender, UnboundedReceiver); [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: you can suppress this lint if you plan to use the trait only in your own code, or do not care about auto traits like `Send` on the `Future` [INFO] [stdout] = note: `#[warn(async_fn_in_trait)]` on by default [INFO] [stdout] help: you can alternatively desugar to a normal `fn` that returns `impl Future` and add any desired bounds such as `Send`, but these cannot be relaxed without a breaking API change [INFO] [stdout] | [INFO] [stdout] 12 - async fn connect(&self) -> (UnboundedSender, UnboundedReceiver); [INFO] [stdout] 12 + fn connect(&self) -> impl std::future::Future, UnboundedReceiver)> + Send; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 291 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating src/util/remote_shell_exec.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/util/get_file.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/util/put_file.rs from 2021 edition to 2024 [INFO] [stderr] Fixed src/util/put_file.rs (1 fix) [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/put_file.rs:63:11 [INFO] [stdout] | [INFO] [stdout] 63 | while let Ok(bytes_read) = reader.read(&mut buffer[0..chunk_len as usize]) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^----------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/put_file.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating src/util/remote_shell.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/demo/tx_datagram.rs from 2021 edition to 2024 [INFO] [stderr] Migrating src/demo/rx_datagram.rs from 2021 edition to 2024 [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/put_file.rs:63:11 [INFO] [stdout] | [INFO] [stdout] 63 | while let Ok(bytes_read) = reader.read(&mut buffer[0..chunk_len as usize]) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^----------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/put_file.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 10.29s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking fjage_rs v0.1.0 (/tmp/fixit) [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:24:3 [INFO] [stdout] | [INFO] [stdout] 24 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 24 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:24:3 [INFO] [stdout] | [INFO] [stdout] 24 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 24 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:39:3 [INFO] [stdout] | [INFO] [stdout] 39 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 39 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:39:3 [INFO] [stdout] | [INFO] [stdout] 39 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 39 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:61:3 [INFO] [stdout] | [INFO] [stdout] 61 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 61 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:61:3 [INFO] [stdout] | [INFO] [stdout] 61 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 61 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:89:3 [INFO] [stdout] | [INFO] [stdout] 89 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 89 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:105:3 [INFO] [stdout] | [INFO] [stdout] 105 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 105 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:89:3 [INFO] [stdout] | [INFO] [stdout] 89 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 89 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:121:3 [INFO] [stdout] | [INFO] [stdout] 121 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 121 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:105:3 [INFO] [stdout] | [INFO] [stdout] 105 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 105 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 131 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:121:3 [INFO] [stdout] | [INFO] [stdout] 121 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 121 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 131 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:196:3 [INFO] [stdout] | [INFO] [stdout] 196 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 196 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:215:3 [INFO] [stdout] | [INFO] [stdout] 215 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 215 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:196:3 [INFO] [stdout] | [INFO] [stdout] 196 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 196 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:215:3 [INFO] [stdout] | [INFO] [stdout] 215 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 215 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:228:3 [INFO] [stdout] | [INFO] [stdout] 228 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 228 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:228:3 [INFO] [stdout] | [INFO] [stdout] 228 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 228 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:247:3 [INFO] [stdout] | [INFO] [stdout] 247 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 247 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:247:3 [INFO] [stdout] | [INFO] [stdout] 247 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 247 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:279:3 [INFO] [stdout] | [INFO] [stdout] 279 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 279 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:279:3 [INFO] [stdout] | [INFO] [stdout] 279 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 279 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:292:3 [INFO] [stdout] | [INFO] [stdout] 292 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 292 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:292:3 [INFO] [stdout] | [INFO] [stdout] 292 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 292 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:310:3 [INFO] [stdout] | [INFO] [stdout] 310 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 310 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:310:3 [INFO] [stdout] | [INFO] [stdout] 310 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 310 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:325:3 [INFO] [stdout] | [INFO] [stdout] 325 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 325 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:325:3 [INFO] [stdout] | [INFO] [stdout] 325 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 325 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:346:3 [INFO] [stdout] | [INFO] [stdout] 346 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 346 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:346:3 [INFO] [stdout] | [INFO] [stdout] 346 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 346 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:366:3 [INFO] [stdout] | [INFO] [stdout] 366 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 366 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:383:3 [INFO] [stdout] | [INFO] [stdout] 383 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 383 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:400:3 [INFO] [stdout] | [INFO] [stdout] 400 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 400 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:366:3 [INFO] [stdout] | [INFO] [stdout] 366 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 366 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:383:3 [INFO] [stdout] | [INFO] [stdout] 383 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 383 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:427:3 [INFO] [stdout] | [INFO] [stdout] 427 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 427 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:400:3 [INFO] [stdout] | [INFO] [stdout] 400 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 400 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:469:3 [INFO] [stdout] | [INFO] [stdout] 469 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 469 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:427:3 [INFO] [stdout] | [INFO] [stdout] 427 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 427 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:469:3 [INFO] [stdout] | [INFO] [stdout] 469 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 469 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:481:3 [INFO] [stdout] | [INFO] [stdout] 481 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 481 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:481:3 [INFO] [stdout] | [INFO] [stdout] 481 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 481 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:503:3 [INFO] [stdout] | [INFO] [stdout] 503 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 503 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:503:3 [INFO] [stdout] | [INFO] [stdout] 503 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 503 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:515:3 [INFO] [stdout] | [INFO] [stdout] 515 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 515 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/message.rs:515:3 [INFO] [stdout] | [INFO] [stdout] 515 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 515 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:86:3 [INFO] [stdout] | [INFO] [stdout] 86 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 86 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:86:3 [INFO] [stdout] | [INFO] [stdout] 86 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 86 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:130:3 [INFO] [stdout] | [INFO] [stdout] 130 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 130 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:161:3 [INFO] [stdout] | [INFO] [stdout] 161 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 161 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:130:3 [INFO] [stdout] | [INFO] [stdout] 130 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 130 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:161:3 [INFO] [stdout] | [INFO] [stdout] 161 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 161 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:193:3 [INFO] [stdout] | [INFO] [stdout] 193 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 193 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:193:3 [INFO] [stdout] | [INFO] [stdout] 193 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 193 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:219:3 [INFO] [stdout] | [INFO] [stdout] 219 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 219 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:219:3 [INFO] [stdout] | [INFO] [stdout] 219 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 219 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:245:3 [INFO] [stdout] | [INFO] [stdout] 245 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 245 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:245:3 [INFO] [stdout] | [INFO] [stdout] 245 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 245 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:271:3 [INFO] [stdout] | [INFO] [stdout] 271 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 271 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:298:3 [INFO] [stdout] | [INFO] [stdout] 298 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 298 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:271:3 [INFO] [stdout] | [INFO] [stdout] 271 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 271 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:298:3 [INFO] [stdout] | [INFO] [stdout] 298 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 298 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:352:3 [INFO] [stdout] | [INFO] [stdout] 352 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 352 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:352:3 [INFO] [stdout] | [INFO] [stdout] 352 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 352 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:413:3 [INFO] [stdout] | [INFO] [stdout] 413 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 413 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:375:3 [INFO] [stdout] | [INFO] [stdout] 375 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 375 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:436:3 [INFO] [stdout] | [INFO] [stdout] 436 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 436 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:459:3 [INFO] [stdout] | [INFO] [stdout] 459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:413:3 [INFO] [stdout] | [INFO] [stdout] 413 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 413 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:436:3 [INFO] [stdout] | [INFO] [stdout] 436 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 436 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:459:3 [INFO] [stdout] | [INFO] [stdout] 459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:499:3 [INFO] [stdout] | [INFO] [stdout] 499 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 499 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:524:3 [INFO] [stdout] | [INFO] [stdout] 524 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 524 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:499:3 [INFO] [stdout] | [INFO] [stdout] 499 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 499 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:548:3 [INFO] [stdout] | [INFO] [stdout] 548 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 548 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:524:3 [INFO] [stdout] | [INFO] [stdout] 524 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 524 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:573:3 [INFO] [stdout] | [INFO] [stdout] 573 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 573 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:548:3 [INFO] [stdout] | [INFO] [stdout] 548 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 548 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:599:3 [INFO] [stdout] | [INFO] [stdout] 599 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 599 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:573:3 [INFO] [stdout] | [INFO] [stdout] 573 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 573 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:15:3 [INFO] [stdout] | [INFO] [stdout] 15 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 15 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/param.rs:599:3 [INFO] [stdout] | [INFO] [stdout] 599 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 599 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:33:3 [INFO] [stdout] | [INFO] [stdout] 33 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:15:3 [INFO] [stdout] | [INFO] [stdout] 15 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 15 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:55:3 [INFO] [stdout] | [INFO] [stdout] 55 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 55 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:33:3 [INFO] [stdout] | [INFO] [stdout] 33 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 33 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:87:3 [INFO] [stdout] | [INFO] [stdout] 87 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 87 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 101 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:55:3 [INFO] [stdout] | [INFO] [stdout] 55 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 55 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:114:3 [INFO] [stdout] | [INFO] [stdout] 114 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 114 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 73 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:87:3 [INFO] [stdout] | [INFO] [stdout] 87 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 87 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:129:3 [INFO] [stdout] | [INFO] [stdout] 129 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 129 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 101 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:144:3 [INFO] [stdout] | [INFO] [stdout] 144 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 144 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:114:3 [INFO] [stdout] | [INFO] [stdout] 114 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 114 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:129:3 [INFO] [stdout] | [INFO] [stdout] 129 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 129 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:160:3 [INFO] [stdout] | [INFO] [stdout] 160 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 160 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:144:3 [INFO] [stdout] | [INFO] [stdout] 144 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 144 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:187:3 [INFO] [stdout] | [INFO] [stdout] 187 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 187 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:160:3 [INFO] [stdout] | [INFO] [stdout] 160 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 160 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/ffi/mod.rs:226:3 [WARN] too many lines in the log, truncating it