[INFO] fetching crate dylink 0.10.0... [INFO] checking dylink-0.10.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate dylink 0.10.0 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate dylink 0.10.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate dylink 0.10.0 [INFO] finished tweaking crates.io crate dylink 0.10.0 [INFO] tweaked toml for crates.io crate dylink 0.10.0 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 5 packages to latest compatible versions [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 39f2d4f503a32cf64d0fa60ed103e25d20d1587b91d03b05fff2b250388c8069 [INFO] running `Command { std: "docker" "start" "-a" "39f2d4f503a32cf64d0fa60ed103e25d20d1587b91d03b05fff2b250388c8069", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "39f2d4f503a32cf64d0fa60ed103e25d20d1587b91d03b05fff2b250388c8069", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "39f2d4f503a32cf64d0fa60ed103e25d20d1587b91d03b05fff2b250388c8069", kill_on_drop: false }` [INFO] [stdout] 39f2d4f503a32cf64d0fa60ed103e25d20d1587b91d03b05fff2b250388c8069 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 61cab855c57a269f638ae02c3275a84ce331d3c8b0e5303da28379d2bd760a24 [INFO] running `Command { std: "docker" "start" "-a" "61cab855c57a269f638ae02c3275a84ce331d3c8b0e5303da28379d2bd760a24", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling quote v1.0.37 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Compiling dylink_macro v0.10.0 [INFO] [stderr] Checking dylink v0.10.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `dylink` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:204:5 [INFO] [stderr] | [INFO] [stderr] 204 | ($($name:expr_2021),+ $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 1 previous error [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/os/unix/c.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 143 | | pub fn dlopen(filename: *const ffi::c_char, flag: ffi::c_int) -> *mut ffi::c_void; [INFO] [stdout] 144 | | pub fn dlerror() -> *const ffi::c_char; [INFO] [stdout] 145 | | pub fn dlsym(handle: *mut ffi::c_void, symbol: *const ffi::c_char) -> *const ffi::c_void; [INFO] [stdout] ... | [INFO] [stdout] 154 | | ) -> ffi::c_int; [INFO] [stdout] 155 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/os/unix/c.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 166 | | pub fn dl_iterate_phdr(callback: DlIteratePhdrCallback, data: *mut ffi::c_void) -> ffi::c_int; [INFO] [stdout] 167 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:204:11 [INFO] [stdout] | [INFO] [stdout] 204 | ($($name:expr),+ $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 204 | ($($name:expr_2021),+ $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:32:12 [INFO] [stdout] | [INFO] [stdout] 32 | let raw = c::dlerror(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | unsafe fn c_dlerror() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:36:8 [INFO] [stdout] | [INFO] [stdout] 36 | Some(ffi::CStr::from_ptr(raw).to_owned()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:58:34 [INFO] [stdout] | [INFO] [stdout] 58 | let handle: *mut ffi::c_void = c::dlopen(c_str.as_ptr(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:55:2 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn open(path: &ffi::OsStr) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:62:14 [INFO] [stdout] | [INFO] [stdout] 62 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:68:34 [INFO] [stdout] | [INFO] [stdout] 68 | let handle: *mut ffi::c_void = c::dlopen(ptr::null(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:66:2 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn this() -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:72:14 [INFO] [stdout] | [INFO] [stdout] 72 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlsym` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:79:3 [INFO] [stdout] | [INFO] [stdout] 79 | c::dlsym(self.0.as_ptr(), name.as_ptr()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:78:2 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn raw_symbol(&self, name: &ffi::CStr) -> *const Symbol { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:86:11 [INFO] [stdout] | [INFO] [stdout] 86 | let _ = c_dlerror(); // clear existing errors [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:82:2 [INFO] [stdout] | [INFO] [stdout] 82 | pub unsafe fn symbol<'a>(&self, name: &str) -> io::Result<*const Symbol> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::raw_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | let handle = self.raw_symbol(&c_str).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:89:22 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | let this = Self::this()?; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:95:2 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn try_clone(&self) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::open` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:105:4 [INFO] [stdout] | [INFO] [stdout] 105 | Self::open(path.as_os_str()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlinfo` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:119:6 [INFO] [stdout] | [INFO] [stdout] 119 | if c::dlinfo( [INFO] [stdout] | ____________^ [INFO] [stdout] 120 | | self.0.as_ptr(), [INFO] [stdout] 121 | | c::RTLD_DI_LINKMAP, [INFO] [stdout] 122 | | &mut map_ptr as *mut _ as *mut _, [INFO] [stdout] 123 | | ) == 0 [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:117:2 [INFO] [stdout] | [INFO] [stdout] 117 | pub(crate) unsafe fn to_ptr(&self) -> *const img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:125:4 [INFO] [stdout] | [INFO] [stdout] 125 | (*map_ptr).l_addr as *const img::Image [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:156:6 [INFO] [stdout] | [INFO] [stdout] 156 | if c::dladdr(addr.cast(), info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:154:2 [INFO] [stdout] | [INFO] [stdout] 154 | pub(crate) unsafe fn from_ptr(addr: *const img::Image) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:157:15 [INFO] [stdout] | [INFO] [stdout] 157 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:158:32 [INFO] [stdout] | [INFO] [stdout] 158 | let filename = dlopen_fname(ffi::CStr::from_ptr(info.dli_fname)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:159:17 [INFO] [stdout] | [INFO] [stdout] 159 | let handle = c::dlopen(filename, c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:194:6 [INFO] [stdout] | [INFO] [stdout] 194 | if c::dladdr(symbol, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:190:1 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn base_addr(symbol: *const std::ffi::c_void) -> *mut img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:195:15 [INFO] [stdout] | [INFO] [stdout] 195 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dl_iterate_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:260:2 [INFO] [stdout] | [INFO] [stdout] 260 | c::dl_iterate_phdr(callback::, &mut f as *mut _ as *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:245:1 [INFO] [stdout] | [INFO] [stdout] 245 | / unsafe fn iter_phdr(mut f: F) -> ffi::c_int [INFO] [stdout] 246 | | where [INFO] [stdout] 247 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:258:3 [INFO] [stdout] | [INFO] [stdout] 258 | (*f)(info, size) [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:249:2 [INFO] [stdout] | [INFO] [stdout] 249 | / unsafe extern "C" fn callback( [INFO] [stdout] 250 | | info: *mut c::dl_phdr_info, [INFO] [stdout] 251 | | size: usize, [INFO] [stdout] 252 | | data: *mut ffi::c_void, [INFO] [stdout] 253 | | ) -> ffi::c_int [INFO] [stdout] 254 | | where [INFO] [stdout] 255 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::iter_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:266:10 [INFO] [stdout] | [INFO] [stdout] 266 | let _ = iter_phdr(|info, _| { [INFO] [stdout] | _____________^ [INFO] [stdout] 267 | | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] 268 | | None [INFO] [stdout] 269 | | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] ... | [INFO] [stdout] 281 | | 0 [INFO] [stdout] 282 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:264:1 [INFO] [stdout] | [INFO] [stdout] 264 | pub(crate) unsafe fn load_objects() -> io::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:267:22 [INFO] [stdout] | [INFO] [stdout] 267 | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:15 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:35 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:277:15 [INFO] [stdout] | [INFO] [stdout] 277 | base_addr: (*info).dlpi_addr as *mut img::Image, [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:311:21 [INFO] [stdout] | [INFO] [stdout] 311 | let magic: &[u8] = std::slice::from_raw_parts(hdr.cast(), magic_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:305:1 [INFO] [stdout] | [INFO] [stdout] 305 | pub(crate) unsafe fn hdr_size(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:315:42 [INFO] [stdout] | [INFO] [stdout] 315 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:319:45 [INFO] [stdout] | [INFO] [stdout] 319 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:10 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:11 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:326:9 [INFO] [stdout] | [INFO] [stdout] 326 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:330:9 [INFO] [stdout] | [INFO] [stdout] 330 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:353:6 [INFO] [stdout] | [INFO] [stdout] 353 | if c::dladdr(hdr as *const _, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn hdr_path(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:354:15 [INFO] [stdout] | [INFO] [stdout] 354 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:355:15 [INFO] [stdout] | [INFO] [stdout] 355 | let path = ffi::CStr::from_ptr(info.dli_fname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:359:15 [INFO] [stdout] | [INFO] [stdout] 359 | let this = InnerLibrary::this()?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:360:7 [INFO] [stdout] | [INFO] [stdout] 360 | if this.to_ptr() == hdr { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `Opaque` is never constructed [INFO] [stdout] --> src/sealed.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | pub struct Opaque { [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/os/unix.rs:89:6 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/os/unix.rs:91:3 [INFO] [stdout] | [INFO] [stdout] 91 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match c_dlerror() { Some(err) => { [INFO] [stdout] 90 | Err(io::Error::new(io::ErrorKind::Other, err.to_string_lossy())) [INFO] [stdout] 91 ~ } _ => { [INFO] [stdout] 92 | Ok(handle) [INFO] [stdout] 93 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 48 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating tests/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `dylink` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/lib.rs:204:5 [INFO] [stderr] | [INFO] [stderr] 204 | ($($name:expr_2021),+ $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 1 previous error [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/os/unix/c.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 143 | | pub fn dlopen(filename: *const ffi::c_char, flag: ffi::c_int) -> *mut ffi::c_void; [INFO] [stdout] 144 | | pub fn dlerror() -> *const ffi::c_char; [INFO] [stdout] 145 | | pub fn dlsym(handle: *mut ffi::c_void, symbol: *const ffi::c_char) -> *const ffi::c_void; [INFO] [stdout] ... | [INFO] [stdout] 154 | | ) -> ffi::c_int; [INFO] [stdout] 155 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/os/unix/c.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 166 | | pub fn dl_iterate_phdr(callback: DlIteratePhdrCallback, data: *mut ffi::c_void) -> ffi::c_int; [INFO] [stdout] 167 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/lib.rs:204:11 [INFO] [stdout] | [INFO] [stdout] 204 | ($($name:expr),+ $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 204 | ($($name:expr_2021),+ $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:32:12 [INFO] [stdout] | [INFO] [stdout] 32 | let raw = c::dlerror(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | unsafe fn c_dlerror() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:36:8 [INFO] [stdout] | [INFO] [stdout] 36 | Some(ffi::CStr::from_ptr(raw).to_owned()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:58:34 [INFO] [stdout] | [INFO] [stdout] 58 | let handle: *mut ffi::c_void = c::dlopen(c_str.as_ptr(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:55:2 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn open(path: &ffi::OsStr) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:62:14 [INFO] [stdout] | [INFO] [stdout] 62 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:68:34 [INFO] [stdout] | [INFO] [stdout] 68 | let handle: *mut ffi::c_void = c::dlopen(ptr::null(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:66:2 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn this() -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:72:14 [INFO] [stdout] | [INFO] [stdout] 72 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlsym` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:79:3 [INFO] [stdout] | [INFO] [stdout] 79 | c::dlsym(self.0.as_ptr(), name.as_ptr()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:78:2 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn raw_symbol(&self, name: &ffi::CStr) -> *const Symbol { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:86:11 [INFO] [stdout] | [INFO] [stdout] 86 | let _ = c_dlerror(); // clear existing errors [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:82:2 [INFO] [stdout] | [INFO] [stdout] 82 | pub unsafe fn symbol<'a>(&self, name: &str) -> io::Result<*const Symbol> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::raw_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | let handle = self.raw_symbol(&c_str).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:89:22 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | let this = Self::this()?; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:95:2 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn try_clone(&self) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::open` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:105:4 [INFO] [stdout] | [INFO] [stdout] 105 | Self::open(path.as_os_str()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlinfo` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:119:6 [INFO] [stdout] | [INFO] [stdout] 119 | if c::dlinfo( [INFO] [stdout] | ____________^ [INFO] [stdout] 120 | | self.0.as_ptr(), [INFO] [stdout] 121 | | c::RTLD_DI_LINKMAP, [INFO] [stdout] 122 | | &mut map_ptr as *mut _ as *mut _, [INFO] [stdout] 123 | | ) == 0 [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:117:2 [INFO] [stdout] | [INFO] [stdout] 117 | pub(crate) unsafe fn to_ptr(&self) -> *const img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:125:4 [INFO] [stdout] | [INFO] [stdout] 125 | (*map_ptr).l_addr as *const img::Image [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:156:6 [INFO] [stdout] | [INFO] [stdout] 156 | if c::dladdr(addr.cast(), info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:154:2 [INFO] [stdout] | [INFO] [stdout] 154 | pub(crate) unsafe fn from_ptr(addr: *const img::Image) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:157:15 [INFO] [stdout] | [INFO] [stdout] 157 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:158:32 [INFO] [stdout] | [INFO] [stdout] 158 | let filename = dlopen_fname(ffi::CStr::from_ptr(info.dli_fname)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:159:17 [INFO] [stdout] | [INFO] [stdout] 159 | let handle = c::dlopen(filename, c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:194:6 [INFO] [stdout] | [INFO] [stdout] 194 | if c::dladdr(symbol, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:190:1 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn base_addr(symbol: *const std::ffi::c_void) -> *mut img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:195:15 [INFO] [stdout] | [INFO] [stdout] 195 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dl_iterate_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:260:2 [INFO] [stdout] | [INFO] [stdout] 260 | c::dl_iterate_phdr(callback::, &mut f as *mut _ as *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:245:1 [INFO] [stdout] | [INFO] [stdout] 245 | / unsafe fn iter_phdr(mut f: F) -> ffi::c_int [INFO] [stdout] 246 | | where [INFO] [stdout] 247 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:258:3 [INFO] [stdout] | [INFO] [stdout] 258 | (*f)(info, size) [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:249:2 [INFO] [stdout] | [INFO] [stdout] 249 | / unsafe extern "C" fn callback( [INFO] [stdout] 250 | | info: *mut c::dl_phdr_info, [INFO] [stdout] 251 | | size: usize, [INFO] [stdout] 252 | | data: *mut ffi::c_void, [INFO] [stdout] 253 | | ) -> ffi::c_int [INFO] [stdout] 254 | | where [INFO] [stdout] 255 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::iter_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:266:10 [INFO] [stdout] | [INFO] [stdout] 266 | let _ = iter_phdr(|info, _| { [INFO] [stdout] | _____________^ [INFO] [stdout] 267 | | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] 268 | | None [INFO] [stdout] 269 | | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] ... | [INFO] [stdout] 281 | | 0 [INFO] [stdout] 282 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:264:1 [INFO] [stdout] | [INFO] [stdout] 264 | pub(crate) unsafe fn load_objects() -> io::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:267:22 [INFO] [stdout] | [INFO] [stdout] 267 | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:15 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:35 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:277:15 [INFO] [stdout] | [INFO] [stdout] 277 | base_addr: (*info).dlpi_addr as *mut img::Image, [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:311:21 [INFO] [stdout] | [INFO] [stdout] 311 | let magic: &[u8] = std::slice::from_raw_parts(hdr.cast(), magic_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:305:1 [INFO] [stdout] | [INFO] [stdout] 305 | pub(crate) unsafe fn hdr_size(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:315:42 [INFO] [stdout] | [INFO] [stdout] 315 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:319:45 [INFO] [stdout] | [INFO] [stdout] 319 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:10 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:11 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:326:9 [INFO] [stdout] | [INFO] [stdout] 326 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:330:9 [INFO] [stdout] | [INFO] [stdout] 330 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:353:6 [INFO] [stdout] | [INFO] [stdout] 353 | if c::dladdr(hdr as *const _, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn hdr_path(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:354:15 [INFO] [stdout] | [INFO] [stdout] 354 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:355:15 [INFO] [stdout] | [INFO] [stdout] 355 | let path = ffi::CStr::from_ptr(info.dli_fname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:359:15 [INFO] [stdout] | [INFO] [stdout] 359 | let this = InnerLibrary::this()?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:360:7 [INFO] [stdout] | [INFO] [stdout] 360 | if this.to_ptr() == hdr { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `Opaque` is never constructed [INFO] [stdout] --> src/sealed.rs:4:12 [INFO] [stdout] | [INFO] [stdout] 4 | pub struct Opaque { [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/os/unix.rs:89:6 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/os/unix.rs:91:3 [INFO] [stdout] | [INFO] [stdout] 91 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match c_dlerror() { Some(err) => { [INFO] [stdout] 90 | Err(io::Error::new(io::ErrorKind::Other, err.to_string_lossy())) [INFO] [stdout] 91 ~ } _ => { [INFO] [stdout] 92 | Ok(handle) [INFO] [stdout] 93 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 48 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Fixed tests/lib.rs (3 fixes) [INFO] [stderr] Migrating tests/unix.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/linux.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/macos.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/windows.rs from 2021 edition to 2024 [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 2.65s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking dylink v0.10.0 (/tmp/fixit) [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/os/unix/c.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | / extern "C" { [INFO] [stdout] 143 | | pub fn dlopen(filename: *const ffi::c_char, flag: ffi::c_int) -> *mut ffi::c_void; [INFO] [stdout] 144 | | pub fn dlerror() -> *const ffi::c_char; [INFO] [stdout] 145 | | pub fn dlsym(handle: *mut ffi::c_void, symbol: *const ffi::c_char) -> *const ffi::c_void; [INFO] [stdout] ... | [INFO] [stdout] 154 | | ) -> ffi::c_int; [INFO] [stdout] 155 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/os/unix/c.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / extern "C" { [INFO] [stdout] 166 | | pub fn dl_iterate_phdr(callback: DlIteratePhdrCallback, data: *mut ffi::c_void) -> ffi::c_int; [INFO] [stdout] 167 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/os/unix/c.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | / extern "C" { [INFO] [stdout] 143 | | pub fn dlopen(filename: *const ffi::c_char, flag: ffi::c_int) -> *mut ffi::c_void; [INFO] [stdout] 144 | | pub fn dlerror() -> *const ffi::c_char; [INFO] [stdout] 145 | | pub fn dlsym(handle: *mut ffi::c_void, symbol: *const ffi::c_char) -> *const ffi::c_void; [INFO] [stdout] ... | [INFO] [stdout] 154 | | ) -> ffi::c_int; [INFO] [stdout] 155 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/os/unix/c.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / extern "C" { [INFO] [stdout] 166 | | pub fn dl_iterate_phdr(callback: DlIteratePhdrCallback, data: *mut ffi::c_void) -> ffi::c_int; [INFO] [stdout] 167 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:32:12 [INFO] [stdout] | [INFO] [stdout] 32 | let raw = c::dlerror(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | unsafe fn c_dlerror() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:32:12 [INFO] [stdout] | [INFO] [stdout] 32 | let raw = c::dlerror(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | unsafe fn c_dlerror() -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:36:8 [INFO] [stdout] | [INFO] [stdout] 36 | Some(ffi::CStr::from_ptr(raw).to_owned()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:36:8 [INFO] [stdout] | [INFO] [stdout] 36 | Some(ffi::CStr::from_ptr(raw).to_owned()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:58:34 [INFO] [stdout] | [INFO] [stdout] 58 | let handle: *mut ffi::c_void = c::dlopen(c_str.as_ptr(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:55:2 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn open(path: &ffi::OsStr) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:58:34 [INFO] [stdout] | [INFO] [stdout] 58 | let handle: *mut ffi::c_void = c::dlopen(c_str.as_ptr(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:55:2 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn open(path: &ffi::OsStr) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:62:14 [INFO] [stdout] | [INFO] [stdout] 62 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:62:14 [INFO] [stdout] | [INFO] [stdout] 62 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:68:34 [INFO] [stdout] | [INFO] [stdout] 68 | let handle: *mut ffi::c_void = c::dlopen(ptr::null(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:66:2 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn this() -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:68:34 [INFO] [stdout] | [INFO] [stdout] 68 | let handle: *mut ffi::c_void = c::dlopen(ptr::null(), c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:66:2 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn this() -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:72:14 [INFO] [stdout] | [INFO] [stdout] 72 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:72:14 [INFO] [stdout] | [INFO] [stdout] 72 | let err = c_dlerror().unwrap(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlsym` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:79:3 [INFO] [stdout] | [INFO] [stdout] 79 | c::dlsym(self.0.as_ptr(), name.as_ptr()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:78:2 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn raw_symbol(&self, name: &ffi::CStr) -> *const Symbol { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlsym` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:79:3 [INFO] [stdout] | [INFO] [stdout] 79 | c::dlsym(self.0.as_ptr(), name.as_ptr()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:78:2 [INFO] [stdout] | [INFO] [stdout] 78 | pub unsafe fn raw_symbol(&self, name: &ffi::CStr) -> *const Symbol { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:86:11 [INFO] [stdout] | [INFO] [stdout] 86 | let _ = c_dlerror(); // clear existing errors [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:82:2 [INFO] [stdout] | [INFO] [stdout] 82 | pub unsafe fn symbol<'a>(&self, name: &str) -> io::Result<*const Symbol> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:86:11 [INFO] [stdout] | [INFO] [stdout] 86 | let _ = c_dlerror(); // clear existing errors [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:82:2 [INFO] [stdout] | [INFO] [stdout] 82 | pub unsafe fn symbol<'a>(&self, name: &str) -> io::Result<*const Symbol> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::raw_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | let handle = self.raw_symbol(&c_str).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::raw_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | let handle = self.raw_symbol(&c_str).cast_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:89:22 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c_dlerror` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:89:22 [INFO] [stdout] | [INFO] [stdout] 89 | if let Some(err) = c_dlerror() { [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | let this = Self::this()?; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:95:2 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn try_clone(&self) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | let this = Self::this()?; [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:95:2 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn try_clone(&self) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::open` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:105:4 [INFO] [stdout] | [INFO] [stdout] 105 | Self::open(path.as_os_str()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:101:20 [INFO] [stdout] | [INFO] [stdout] 101 | let Some(hdr) = self.to_ptr().as_ref() else { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::open` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:105:4 [INFO] [stdout] | [INFO] [stdout] 105 | Self::open(path.as_os_str()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlinfo` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:119:6 [INFO] [stdout] | [INFO] [stdout] 119 | if c::dlinfo( [INFO] [stdout] | ____________^ [INFO] [stdout] 120 | | self.0.as_ptr(), [INFO] [stdout] 121 | | c::RTLD_DI_LINKMAP, [INFO] [stdout] 122 | | &mut map_ptr as *mut _ as *mut _, [INFO] [stdout] 123 | | ) == 0 [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:117:2 [INFO] [stdout] | [INFO] [stdout] 117 | pub(crate) unsafe fn to_ptr(&self) -> *const img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:125:4 [INFO] [stdout] | [INFO] [stdout] 125 | (*map_ptr).l_addr as *const img::Image [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlinfo` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:119:6 [INFO] [stdout] | [INFO] [stdout] 119 | if c::dlinfo( [INFO] [stdout] | ____________^ [INFO] [stdout] 120 | | self.0.as_ptr(), [INFO] [stdout] 121 | | c::RTLD_DI_LINKMAP, [INFO] [stdout] 122 | | &mut map_ptr as *mut _ as *mut _, [INFO] [stdout] 123 | | ) == 0 [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:117:2 [INFO] [stdout] | [INFO] [stdout] 117 | pub(crate) unsafe fn to_ptr(&self) -> *const img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:125:4 [INFO] [stdout] | [INFO] [stdout] 125 | (*map_ptr).l_addr as *const img::Image [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:156:6 [INFO] [stdout] | [INFO] [stdout] 156 | if c::dladdr(addr.cast(), info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:154:2 [INFO] [stdout] | [INFO] [stdout] 154 | pub(crate) unsafe fn from_ptr(addr: *const img::Image) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:157:15 [INFO] [stdout] | [INFO] [stdout] 157 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:158:32 [INFO] [stdout] | [INFO] [stdout] 158 | let filename = dlopen_fname(ffi::CStr::from_ptr(info.dli_fname)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:156:6 [INFO] [stdout] | [INFO] [stdout] 156 | if c::dladdr(addr.cast(), info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:154:2 [INFO] [stdout] | [INFO] [stdout] 154 | pub(crate) unsafe fn from_ptr(addr: *const img::Image) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:159:17 [INFO] [stdout] | [INFO] [stdout] 159 | let handle = c::dlopen(filename, c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:157:15 [INFO] [stdout] | [INFO] [stdout] 157 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:158:32 [INFO] [stdout] | [INFO] [stdout] 158 | let filename = dlopen_fname(ffi::CStr::from_ptr(info.dli_fname)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dlopen` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:159:17 [INFO] [stdout] | [INFO] [stdout] 159 | let handle = c::dlopen(filename, c::RTLD_NOW | c::RTLD_LOCAL); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:194:6 [INFO] [stdout] | [INFO] [stdout] 194 | if c::dladdr(symbol, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:190:1 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn base_addr(symbol: *const std::ffi::c_void) -> *mut img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:195:15 [INFO] [stdout] | [INFO] [stdout] 195 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:194:6 [INFO] [stdout] | [INFO] [stdout] 194 | if c::dladdr(symbol, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:190:1 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn base_addr(symbol: *const std::ffi::c_void) -> *mut img::Image { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:195:15 [INFO] [stdout] | [INFO] [stdout] 195 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dl_iterate_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:260:2 [INFO] [stdout] | [INFO] [stdout] 260 | c::dl_iterate_phdr(callback::, &mut f as *mut _ as *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:245:1 [INFO] [stdout] | [INFO] [stdout] 245 | / unsafe fn iter_phdr(mut f: F) -> ffi::c_int [INFO] [stdout] 246 | | where [INFO] [stdout] 247 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dl_iterate_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:260:2 [INFO] [stdout] | [INFO] [stdout] 260 | c::dl_iterate_phdr(callback::, &mut f as *mut _ as *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:245:1 [INFO] [stdout] | [INFO] [stdout] 245 | / unsafe fn iter_phdr(mut f: F) -> ffi::c_int [INFO] [stdout] 246 | | where [INFO] [stdout] 247 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:258:3 [INFO] [stdout] | [INFO] [stdout] 258 | (*f)(info, size) [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:249:2 [INFO] [stdout] | [INFO] [stdout] 249 | / unsafe extern "C" fn callback( [INFO] [stdout] 250 | | info: *mut c::dl_phdr_info, [INFO] [stdout] 251 | | size: usize, [INFO] [stdout] 252 | | data: *mut ffi::c_void, [INFO] [stdout] 253 | | ) -> ffi::c_int [INFO] [stdout] 254 | | where [INFO] [stdout] 255 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:258:3 [INFO] [stdout] | [INFO] [stdout] 258 | (*f)(info, size) [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:249:2 [INFO] [stdout] | [INFO] [stdout] 249 | / unsafe extern "C" fn callback( [INFO] [stdout] 250 | | info: *mut c::dl_phdr_info, [INFO] [stdout] 251 | | size: usize, [INFO] [stdout] 252 | | data: *mut ffi::c_void, [INFO] [stdout] 253 | | ) -> ffi::c_int [INFO] [stdout] 254 | | where [INFO] [stdout] 255 | | F: FnMut(*mut c::dl_phdr_info, usize) -> ffi::c_int, [INFO] [stdout] | |____________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::iter_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:266:10 [INFO] [stdout] | [INFO] [stdout] 266 | let _ = iter_phdr(|info, _| { [INFO] [stdout] | _____________^ [INFO] [stdout] 267 | | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] 268 | | None [INFO] [stdout] 269 | | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] ... | [INFO] [stdout] 281 | | 0 [INFO] [stdout] 282 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:264:1 [INFO] [stdout] | [INFO] [stdout] 264 | pub(crate) unsafe fn load_objects() -> io::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:267:22 [INFO] [stdout] | [INFO] [stdout] 267 | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::iter_phdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:266:10 [INFO] [stdout] | [INFO] [stdout] 266 | let _ = iter_phdr(|info, _| { [INFO] [stdout] | _____________^ [INFO] [stdout] 267 | | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] 268 | | None [INFO] [stdout] 269 | | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] ... | [INFO] [stdout] 281 | | 0 [INFO] [stdout] 282 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:264:1 [INFO] [stdout] | [INFO] [stdout] 264 | pub(crate) unsafe fn load_objects() -> io::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:267:22 [INFO] [stdout] | [INFO] [stdout] 267 | let path_name = if (*info).dlpi_name.is_null() { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:15 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:269:13 [INFO] [stdout] | [INFO] [stdout] 269 | } else if (*info).dlpi_name.read() == 0i8 { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:35 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:15 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:277:15 [INFO] [stdout] | [INFO] [stdout] 277 | base_addr: (*info).dlpi_addr as *mut img::Image, [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:272:35 [INFO] [stdout] | [INFO] [stdout] 272 | let path = ffi::CStr::from_ptr((*info).dlpi_name); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:277:15 [INFO] [stdout] | [INFO] [stdout] 277 | base_addr: (*info).dlpi_addr as *mut img::Image, [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:311:21 [INFO] [stdout] | [INFO] [stdout] 311 | let magic: &[u8] = std::slice::from_raw_parts(hdr.cast(), magic_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:305:1 [INFO] [stdout] | [INFO] [stdout] 305 | pub(crate) unsafe fn hdr_size(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:311:21 [INFO] [stdout] | [INFO] [stdout] 311 | let magic: &[u8] = std::slice::from_raw_parts(hdr.cast(), magic_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:305:1 [INFO] [stdout] | [INFO] [stdout] 305 | pub(crate) unsafe fn hdr_size(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:315:42 [INFO] [stdout] | [INFO] [stdout] 315 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:315:42 [INFO] [stdout] | [INFO] [stdout] 315 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:319:45 [INFO] [stdout] | [INFO] [stdout] 319 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:319:45 [INFO] [stdout] | [INFO] [stdout] 319 | Ok(mem::size_of::() + (*hdr).sizeofcmds as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:10 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:10 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:11 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:326:9 [INFO] [stdout] | [INFO] [stdout] 326 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:323:11 [INFO] [stdout] | [INFO] [stdout] 323 | match *data.offset(4) { [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:330:9 [INFO] [stdout] | [INFO] [stdout] 330 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:326:9 [INFO] [stdout] | [INFO] [stdout] 326 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:330:9 [INFO] [stdout] | [INFO] [stdout] 330 | Ok((*hdr).e_ehsize as usize) [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:353:6 [INFO] [stdout] | [INFO] [stdout] 353 | if c::dladdr(hdr as *const _, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn hdr_path(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:354:15 [INFO] [stdout] | [INFO] [stdout] 354 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:355:15 [INFO] [stdout] | [INFO] [stdout] 355 | let path = ffi::CStr::from_ptr(info.dli_fname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::c::dladdr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:353:6 [INFO] [stdout] | [INFO] [stdout] 353 | if c::dladdr(hdr as *const _, info.as_mut_ptr()) != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/os/unix.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn hdr_path(hdr: *const img::Image) -> io::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:359:15 [INFO] [stdout] | [INFO] [stdout] 359 | let this = InnerLibrary::this()?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:354:15 [INFO] [stdout] | [INFO] [stdout] 354 | let info = info.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:360:7 [INFO] [stdout] | [INFO] [stdout] 360 | if this.to_ptr() == hdr { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:355:15 [INFO] [stdout] | [INFO] [stdout] 355 | let path = ffi::CStr::from_ptr(info.dli_fname); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::this` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:359:15 [INFO] [stdout] | [INFO] [stdout] 359 | let this = InnerLibrary::this()?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `os::unix::InnerLibrary::to_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/os/unix.rs:360:7 [INFO] [stdout] | [INFO] [stdout] 360 | if this.to_ptr() == hdr { [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 2 previous errors; 43 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] error: aborting due to 2 previous errors; 43 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `dylink` (lib test) due to 3 previous errors; 43 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stderr] error: could not compile `dylink` (lib) due to 3 previous errors; 43 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "61cab855c57a269f638ae02c3275a84ce331d3c8b0e5303da28379d2bd760a24", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "61cab855c57a269f638ae02c3275a84ce331d3c8b0e5303da28379d2bd760a24", kill_on_drop: false }` [INFO] [stdout] 61cab855c57a269f638ae02c3275a84ce331d3c8b0e5303da28379d2bd760a24