[INFO] fetching crate extism-runtime 0.5.5... [INFO] checking extism-runtime-0.5.5 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate extism-runtime 0.5.5 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate extism-runtime 0.5.5 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate extism-runtime 0.5.5 [INFO] finished tweaking crates.io crate extism-runtime 0.5.5 [INFO] tweaked toml for crates.io crate extism-runtime 0.5.5 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 291 packages to latest compatible versions [INFO] [stderr] Adding addr2line v0.19.0 (available: v0.24.1) [INFO] [stderr] Adding base64 v0.21.7 (available: v0.22.1) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding cap-fs-ext v1.0.15 (available: v3.3.0) [INFO] [stderr] Adding cap-primitives v1.0.15 (available: v3.3.0) [INFO] [stderr] Adding cap-rand v1.0.15 (available: v3.3.0) [INFO] [stderr] Adding cap-std v1.0.15 (available: v3.3.0) [INFO] [stderr] Adding cap-time-ext v1.0.15 (available: v3.3.0) [INFO] [stderr] Adding cbindgen v0.24.5 (available: v0.27.0) [INFO] [stderr] Adding clap v3.2.25 (available: v4.5.18) [INFO] [stderr] Adding clap_lex v0.2.4 (available: v0.7.2) [INFO] [stderr] Adding cpp_demangle v0.3.5 (available: v0.4.4) [INFO] [stderr] Adding cranelift-bforest v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen-meta v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen-shared v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-control v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-entity v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-frontend v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-isle v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-native v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-wasm v0.98.2 (available: v0.112.1) [INFO] [stderr] Adding destructure_traitobject v0.2.0 (available: v0.3.0) [INFO] [stderr] Adding dirs v4.0.0 (available: v5.0.1) [INFO] [stderr] Adding dirs-sys v0.3.7 (available: v0.4.1) [INFO] [stderr] Adding env_logger v0.7.1 (available: v0.11.5) [INFO] [stderr] Adding env_logger v0.10.2 (available: v0.11.5) [INFO] [stderr] Adding extism-manifest v0.5.0 (available: v1.7.0) [INFO] [stderr] Adding fallible-iterator v0.2.0 (available: v0.3.0) [INFO] [stderr] Adding fs-set-times v0.19.2 (available: v0.20.1) [INFO] [stderr] Adding fxprof-processed-profile v0.6.0 (available: v0.7.0) [INFO] [stderr] Adding generic-array v0.14.7 (available: v1.1.0) [INFO] [stderr] Adding gimli v0.27.3 (available: v0.31.0) [INFO] [stderr] Adding hashbrown v0.12.3 (available: v0.14.5) [INFO] [stderr] Adding hashbrown v0.13.2 (available: v0.14.5) [INFO] [stderr] Adding heck v0.4.1 (available: v0.5.0) [INFO] [stderr] Adding hermit-abi v0.1.19 (available: v0.4.0) [INFO] [stderr] Adding hermit-abi v0.3.9 (available: v0.4.0) [INFO] [stderr] Adding humantime v1.3.0 (available: v2.1.0) [INFO] [stderr] Adding idna v0.5.0 (available: v1.0.2) [INFO] [stderr] Adding indexmap v1.9.3 (available: v2.5.0) [INFO] [stderr] Adding io-extras v0.17.4 (available: v0.18.2) [INFO] [stderr] Adding io-lifetimes v1.0.11 (available: v2.0.3) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding ittapi v0.3.5 (available: v0.4.0) [INFO] [stderr] Adding ittapi-sys v0.3.5 (available: v0.4.0) [INFO] [stderr] Adding libloading v0.7.4 (available: v0.8.5) [INFO] [stderr] Adding linux-raw-sys v0.3.8 (available: v0.6.5) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding memoffset v0.8.0 (available: v0.9.1) [INFO] [stderr] Adding object v0.30.4 (available: v0.36.4) [INFO] [stderr] Adding openvino v0.5.0 (available: v0.7.2) [INFO] [stderr] Adding openvino-finder v0.5.0 (available: v0.7.2) [INFO] [stderr] Adding openvino-sys v0.5.0 (available: v0.7.2) [INFO] [stderr] Adding ordered-float v2.10.1 (available: v4.3.0) [INFO] [stderr] Adding os_str_bytes v6.6.1 (available: v7.0.0) [INFO] [stderr] Adding pretty_env_logger v0.4.0 (available: v0.5.0) [INFO] [stderr] Adding pulldown-cmark v0.8.0 (available: v0.12.1) [INFO] [stderr] Adding quick-error v1.2.3 (available: v2.0.1) [INFO] [stderr] Adding regalloc2 v0.9.3 (available: v0.10.2) [INFO] [stderr] Adding rustc-hash v1.1.0 (available: v2.0.0) [INFO] [stderr] Adding rustix v0.37.27 (available: v0.38.37) [INFO] [stderr] Adding shellexpand v2.1.2 (available: v3.1.0) [INFO] [stderr] Adding strsim v0.10.0 (available: v0.11.1) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding system-interface v0.25.9 (available: v0.27.2) [INFO] [stderr] Adding toml v0.5.11 (available: v0.8.19) [INFO] [stderr] Adding toml v0.7.8 (available: v0.8.19) [INFO] [stderr] Adding toml_edit v0.19.15 (available: v0.22.22) [INFO] [stderr] Adding unicode-width v0.1.14 (available: v0.2.0) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding wasi-cap-std-sync v11.0.2 (available: v17.0.3) [INFO] [stderr] Adding wasi-common v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasm-encoder v0.29.0 (available: v0.217.0) [INFO] [stderr] Adding wasmparser v0.107.0 (available: v0.217.0) [INFO] [stderr] Adding wasmparser v0.121.2 (available: v0.217.0) [INFO] [stderr] Adding wasmprinter v0.2.80 (available: v0.217.0) [INFO] [stderr] Adding wasmtime v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-asm-macros v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-cache v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-component-macro v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-component-util v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-cranelift v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-cranelift-shared v11.0.2 (available: v19.0.2) [INFO] [stderr] Adding wasmtime-environ v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-fiber v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-jit v11.0.2 (available: v17.0.3) [INFO] [stderr] Adding wasmtime-jit-debug v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-jit-icache-coherence v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-runtime v11.0.2 (available: v20.0.2) [INFO] [stderr] Adding wasmtime-types v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-wasi v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-wasi-nn v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-winch v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-wit-bindgen v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wast v35.0.2 (available: v217.0.0) [INFO] [stderr] Adding wiggle v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wiggle-generate v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding wiggle-macro v11.0.2 (available: v25.0.1) [INFO] [stderr] Adding winch-codegen v0.9.2 (available: v0.23.1) [INFO] [stderr] Adding windows-core v0.52.0 (available: v0.58.0) [INFO] [stderr] Adding windows-sys v0.48.0 (available: v0.59.0) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] [stderr] Adding windows-targets v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding winnow v0.5.40 (available: v0.6.20) [INFO] [stderr] Adding winx v0.35.1 (available: v0.36.3) [INFO] [stderr] Adding wit-parser v0.8.0 (available: v0.217.0) [INFO] [stderr] Adding zstd v0.11.2+zstd.1.5.2 (available: v0.13.2) [INFO] [stderr] Adding zstd-safe v5.0.2+zstd.1.5.2 (available: v7.2.1) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 667bd95d0f1a4b3cc6a8954d13ae9736061edb18fa4a0087e0fec6d855d4464a [INFO] running `Command { std: "docker" "start" "-a" "667bd95d0f1a4b3cc6a8954d13ae9736061edb18fa4a0087e0fec6d855d4464a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "667bd95d0f1a4b3cc6a8954d13ae9736061edb18fa4a0087e0fec6d855d4464a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "667bd95d0f1a4b3cc6a8954d13ae9736061edb18fa4a0087e0fec6d855d4464a", kill_on_drop: false }` [INFO] [stdout] 667bd95d0f1a4b3cc6a8954d13ae9736061edb18fa4a0087e0fec6d855d4464a [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7b9f5dc902de78739146a7a3c1704d1412b01b89f2097889b817e9c13cd95c50 [INFO] running `Command { std: "docker" "start" "-a" "7b9f5dc902de78739146a7a3c1704d1412b01b89f2097889b817e9c13cd95c50", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (2 fixes) [INFO] [stderr] Compiling indexmap v1.9.3 [INFO] [stderr] Compiling semver v1.0.23 [INFO] [stderr] Compiling jobserver v0.1.32 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Checking serde v1.0.210 [INFO] [stderr] Checking zerocopy v0.7.35 [INFO] [stderr] Checking io-lifetimes v1.0.11 [INFO] [stderr] Compiling rustix v0.37.27 [INFO] [stderr] Checking indexmap v2.5.0 [INFO] [stderr] Checking fallible-iterator v0.2.0 [INFO] [stderr] Compiling cc v1.1.21 [INFO] [stderr] Compiling target-lexicon v0.12.16 [INFO] [stderr] Checking stable_deref_trait v1.2.0 [INFO] [stderr] Checking ahash v0.8.11 [INFO] [stderr] Checking linux-raw-sys v0.4.14 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Compiling cranelift-isle v0.98.2 [INFO] [stderr] Checking hashbrown v0.13.2 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling cranelift-codegen-shared v0.98.2 [INFO] [stderr] Checking leb128 v0.2.5 [INFO] [stderr] Compiling cranelift-codegen-meta v0.98.2 [INFO] [stderr] Compiling hashbrown v0.12.3 [INFO] [stderr] Checking bumpalo v3.16.0 [INFO] [stderr] Checking log v0.4.22 [INFO] [stderr] Checking cranelift-entity v0.98.2 [INFO] [stderr] Checking rustc-hash v1.1.0 [INFO] [stderr] Checking gimli v0.27.3 [INFO] [stderr] Checking wasmparser v0.107.0 [INFO] [stderr] Checking slice-group-by v0.3.1 [INFO] [stderr] Checking arbitrary v1.3.2 [INFO] [stderr] Checking regalloc2 v0.9.3 [INFO] [stderr] Compiling zstd-sys v2.0.13+zstd.1.5.6 [INFO] [stderr] Checking object v0.30.4 [INFO] [stderr] Compiling cranelift-codegen v0.98.2 [INFO] [stderr] Checking cranelift-control v0.98.2 [INFO] [stderr] Checking cranelift-bforest v0.98.2 [INFO] [stderr] Checking wasmparser v0.121.2 [INFO] [stderr] Checking ppv-lite86 v0.2.20 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Compiling wasmtime-fiber v11.0.2 [INFO] [stderr] Checking wasm-encoder v0.29.0 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Compiling pulldown-cmark v0.8.0 [INFO] [stderr] Compiling io-extras v0.17.4 [INFO] [stderr] Checking wasmtime-component-util v11.0.2 [INFO] [stderr] Checking wasmtime-types v11.0.2 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Compiling ittapi-sys v0.3.5 [INFO] [stderr] Compiling memoffset v0.8.0 [INFO] [stderr] Checking ambient-authority v0.0.2 [INFO] [stderr] Compiling cap-primitives v1.0.15 [INFO] [stderr] Checking fs-set-times v0.19.2 [INFO] [stderr] Compiling wasmtime-runtime v11.0.2 [INFO] [stderr] Checking is-terminal v0.4.13 [INFO] [stderr] Compiling dirs-sys v0.3.7 [INFO] [stderr] Checking wasmtime-asm-macros v11.0.2 [INFO] [stderr] Checking ipnet v2.10.0 [INFO] [stderr] Compiling id-arena v2.2.1 [INFO] [stderr] Checking termcolor v1.4.1 [INFO] [stderr] Compiling unicode-xid v0.2.6 [INFO] [stderr] Checking maybe-owned v0.3.4 [INFO] [stderr] Compiling cpp_demangle v0.3.5 [INFO] [stderr] Compiling wast v35.0.2 [INFO] [stderr] Compiling wit-parser v0.8.0 [INFO] [stderr] Checking wasmprinter v0.2.80 [INFO] [stderr] Compiling dirs v4.0.0 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking digest v0.10.7 [INFO] [stderr] Checking wasmtime-jit-debug v11.0.2 [INFO] [stderr] Checking serde_json v1.0.128 [INFO] [stderr] Checking memfd v0.6.4 [INFO] [stderr] Checking env_logger v0.10.2 [INFO] [stderr] Checking bincode v1.3.3 [INFO] [stderr] Compiling psm v0.1.23 [INFO] [stderr] Checking wasm-encoder v0.217.0 [INFO] [stderr] Compiling thiserror v1.0.64 [INFO] [stderr] Checking wasmtime-environ v11.0.2 [INFO] [stderr] Checking uuid v1.10.0 [INFO] [stderr] Checking dirs-sys-next v0.1.2 [INFO] [stderr] Checking sptr v0.3.2 [INFO] [stderr] Compiling wasmtime-cache v11.0.2 [INFO] [stderr] Compiling cap-std v1.0.15 [INFO] [stderr] Checking sha2 v0.10.8 [INFO] [stderr] Compiling wasmtime-wit-bindgen v11.0.2 [INFO] [stderr] Checking debugid v0.8.0 [INFO] [stderr] Checking directories-next v2.0.0 [INFO] [stderr] Compiling witx v0.9.1 [INFO] [stderr] Checking file-per-thread-logger v0.2.0 [INFO] [stderr] Checking wast v217.0.0 [INFO] [stderr] Compiling shellexpand v2.1.2 [INFO] [stderr] Checking ittapi v0.3.5 [INFO] [stderr] Checking addr2line v0.19.0 [INFO] [stderr] Checking toml v0.5.11 [INFO] [stderr] Compiling ring v0.17.8 [INFO] [stderr] Checking wasmtime-jit-icache-coherence v11.0.2 [INFO] [stderr] Checking fxhash v0.2.1 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking rustc-demangle v0.1.24 [INFO] [stderr] Compiling wasmtime-component-macro v11.0.2 [INFO] [stderr] Checking fxprof-processed-profile v0.6.0 [INFO] [stderr] Compiling wiggle-generate v11.0.2 [INFO] [stderr] Compiling async-trait v0.1.83 [INFO] [stderr] Checking wasmtime-jit v11.0.2 [INFO] [stderr] Compiling wasi-common v11.0.2 [INFO] [stderr] Compiling io-lifetimes v2.0.3 [INFO] [stderr] Compiling os_str_bytes v6.6.1 [INFO] [stderr] Checking tracing v0.1.40 [INFO] [stderr] Compiling clap_lex v0.2.4 [INFO] [stderr] Checking tinyvec v1.8.0 [INFO] [stderr] Compiling wiggle-macro v11.0.2 [INFO] [stderr] Compiling atty v0.2.14 [INFO] [stderr] Checking spin v0.9.8 [INFO] [stderr] Compiling fastrand v2.1.1 [INFO] [stderr] Compiling textwrap v0.16.1 [INFO] [stderr] Checking untrusted v0.9.0 [INFO] [stderr] Compiling cap-fs-ext v1.0.15 [INFO] [stderr] Checking rustls-pki-types v1.8.0 [INFO] [stderr] Checking wat v1.217.0 [INFO] [stderr] Compiling cbindgen v0.24.5 [INFO] [stderr] Compiling system-interface v0.25.9 [INFO] [stderr] Compiling clap v3.2.25 [INFO] [stderr] Checking unicode-normalization v0.1.24 [INFO] [stderr] Checking cranelift-frontend v0.98.2 [INFO] [stderr] Checking cranelift-native v0.98.2 [INFO] [stderr] Checking cranelift-wasm v0.98.2 [INFO] [stderr] Checking wasmtime-cranelift-shared v11.0.2 [INFO] [stderr] Checking cap-rand v1.0.15 [INFO] [stderr] Checking adler2 v2.0.0 [INFO] [stderr] Checking destructure_traitobject v0.2.0 [INFO] [stderr] Checking unsafe-any-ors v1.0.0 [INFO] [stderr] Checking idna v0.5.0 [INFO] [stderr] Checking miniz_oxide v0.8.0 [INFO] [stderr] Checking wasmtime-cranelift v11.0.2 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking ordered-float v2.10.1 [INFO] [stderr] Compiling zstd-safe v5.0.2+zstd.1.5.2 [INFO] [stderr] Checking cap-time-ext v1.0.15 [INFO] [stderr] Checking serde_spanned v0.6.8 [INFO] [stderr] Checking toml_datetime v0.6.8 [INFO] [stderr] Checking zstd v0.11.2+zstd.1.5.2 [INFO] [stderr] Compiling rustls v0.23.13 [INFO] [stderr] Checking unsafe-libyaml v0.2.11 [INFO] [stderr] Compiling wasmtime-wasi v11.0.2 [INFO] [stderr] Checking winnow v0.5.40 [INFO] [stderr] Checking zeroize v1.8.1 [INFO] [stderr] Checking chrono v0.4.38 [INFO] [stderr] Checking serde-value v0.7.0 [INFO] [stderr] Checking wasmtime v11.0.2 [INFO] [stderr] Checking parking_lot v0.12.3 [INFO] [stderr] Checking serde_yaml v0.9.34+deprecated [INFO] [stderr] Compiling tempfile v3.12.0 [INFO] [stderr] Checking rustls-webpki v0.102.8 [INFO] [stderr] Checking flate2 v1.0.33 [INFO] [stderr] Checking url v2.5.2 [INFO] [stderr] Checking typemap-ors v1.0.0 [INFO] [stderr] Checking toml_edit v0.19.15 [INFO] [stderr] Checking webpki-roots v0.26.6 [INFO] [stderr] Compiling derivative v2.2.0 [INFO] [stderr] Checking thread-id v4.2.2 [INFO] [stderr] Checking arc-swap v1.7.1 [INFO] [stderr] Checking log-mdc v0.1.0 [INFO] [stderr] Checking extism-manifest v0.5.0 [INFO] [stderr] Checking log4rs v1.3.0 [INFO] [stderr] Checking toml v0.7.8 [INFO] [stderr] Compiling extism-runtime v0.5.5 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Checking ureq v2.10.1 [INFO] [stderr] Fixed build.rs (1 fix) [INFO] [stderr] Checking wiggle v11.0.2 [INFO] [stderr] Checking wasi-cap-std-sync v11.0.2 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `extism_runtime` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/pdk.rs [INFO] [stderr] * src/plugin.rs [INFO] [stderr] * src/sdk.rs [INFO] [stderr] * src/timer.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:8:6 [INFO] [stderr] | [INFO] [stderr] 8 | ($input:expr_2021, $index:expr_2021, $ty:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:8:24 [INFO] [stderr] | [INFO] [stderr] 8 | ($input:expr_2021, $index:expr_2021, $ty:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:14:6 [INFO] [stderr] | [INFO] [stderr] 14 | ($input:expr_2021, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:14:27 [INFO] [stderr] | [INFO] [stderr] 14 | ($input:expr_2021, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:14 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:46 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:73 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:77:3 [INFO] [stdout] | [INFO] [stdout] 77 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 77 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/timer.rs:35:18 [INFO] [stderr] | [INFO] [stderr] 35 | ($x:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sdk.rs:271:13 [INFO] [stderr] | [INFO] [stderr] 263 | ) -> PluginIndex { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 271 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sdk.rs:309:13 [INFO] [stderr] | [INFO] [stderr] 299 | ) -> bool { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 309 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 8 previous errors; 2 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:84:3 [INFO] [stdout] | [INFO] [stdout] 84 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 84 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:95:3 [INFO] [stdout] | [INFO] [stdout] 95 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 95 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:107:3 [INFO] [stdout] | [INFO] [stdout] 107 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 107 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:119:3 [INFO] [stdout] | [INFO] [stdout] 119 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 119 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:134:3 [INFO] [stdout] | [INFO] [stdout] 134 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 134 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:159:3 [INFO] [stdout] | [INFO] [stdout] 159 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 159 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:232:3 [INFO] [stdout] | [INFO] [stdout] 232 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 232 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:243:3 [INFO] [stdout] | [INFO] [stdout] 243 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 243 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:255:3 [INFO] [stdout] | [INFO] [stdout] 255 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 255 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:290:3 [INFO] [stdout] | [INFO] [stdout] 290 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 290 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:341:3 [INFO] [stdout] | [INFO] [stdout] 341 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 341 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:359:3 [INFO] [stdout] | [INFO] [stdout] 359 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 359 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:374:3 [INFO] [stdout] | [INFO] [stdout] 374 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 374 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:385:3 [INFO] [stdout] | [INFO] [stdout] 385 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 385 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:458:3 [INFO] [stdout] | [INFO] [stdout] 458 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 458 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:488:3 [INFO] [stdout] | [INFO] [stdout] 488 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 488 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:591:3 [INFO] [stdout] | [INFO] [stdout] 591 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 591 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:625:3 [INFO] [stdout] | [INFO] [stdout] 625 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 625 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:652:3 [INFO] [stdout] | [INFO] [stdout] 652 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 652 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:683:3 [INFO] [stdout] | [INFO] [stdout] 683 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 683 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:769:3 [INFO] [stdout] | [INFO] [stdout] 769 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 769 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:8:13 [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr, $ty:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr_2021, $index:expr, $ty:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:8:26 [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr, $ty:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr_2021, $ty:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:14:13 [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr_2021, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:14:29 [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:17 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr_2021, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:47 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:66 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/timer.rs:35:21 [INFO] [stdout] | [INFO] [stdout] 35 | ($x:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($x:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:90:10 [INFO] [stdout] | [INFO] [stdout] 90 | drop(Box::from_raw(ctx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:85:1 [INFO] [stdout] | [INFO] [stdout] 85 | pub unsafe extern "C" fn extism_context_free(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:101:23 [INFO] [stdout] | [INFO] [stdout] 101 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe extern "C" fn extism_current_plugin_memory(plugin: *mut Internal) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:113:23 [INFO] [stdout] | [INFO] [stdout] 113 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:108:1 [INFO] [stdout] | [INFO] [stdout] 108 | pub unsafe extern "C" fn extism_current_plugin_memory_alloc(plugin: *mut Internal, n: Size) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:128:23 [INFO] [stdout] | [INFO] [stdout] 128 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:120:1 [INFO] [stdout] | [INFO] [stdout] 120 | / pub unsafe extern "C" fn extism_current_plugin_memory_length( [INFO] [stdout] 121 | | plugin: *mut Internal, [INFO] [stdout] 122 | | n: Size, [INFO] [stdout] 123 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:135:1 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe extern "C" fn extism_current_plugin_memory_free(plugin: *mut Internal, ptr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let name = match std::ffi::CStr::from_ptr(name).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | / pub unsafe extern "C" fn extism_function_new( [INFO] [stdout] 161 | | name: *const std::ffi::c_char, [INFO] [stdout] 162 | | inputs: *const ValType, [INFO] [stdout] 163 | | n_inputs: Size, [INFO] [stdout] ... | [INFO] [stdout] 168 | | free_user_data: Option, [INFO] [stdout] 169 | | ) -> *mut ExtismFunction { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:180:9 [INFO] [stdout] | [INFO] [stdout] 180 | std::slice::from_raw_parts(inputs, n_inputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:187:9 [INFO] [stdout] | [INFO] [stdout] 187 | std::slice::from_raw_parts(outputs, n_outputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:218:53 [INFO] [stdout] | [INFO] [stdout] 218 | ValType::I32 => *out = Val::I32(tmp.v.i32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:219:53 [INFO] [stdout] | [INFO] [stdout] 219 | ValType::I64 => *out = Val::I64(tmp.v.i64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:220:53 [INFO] [stdout] | [INFO] [stdout] 220 | ValType::F32 => *out = Val::F32(tmp.v.f32 as u32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | ValType::F64 => *out = Val::F64(tmp.v.f64 as u64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:237:21 [INFO] [stdout] | [INFO] [stdout] 237 | let namespace = std::ffi::CStr::from_ptr(namespace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | / pub unsafe extern "C" fn extism_function_set_namespace( [INFO] [stdout] 234 | | ptr: *mut ExtismFunction, [INFO] [stdout] 235 | | namespace: *const std::ffi::c_char, [INFO] [stdout] 236 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:238:18 [INFO] [stdout] | [INFO] [stdout] 238 | let f = &mut *ptr; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:245:10 [INFO] [stdout] | [INFO] [stdout] 245 | drop(Box::from_raw(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe extern "C" fn extism_function_free(ptr: *mut ExtismFunction) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:265:20 [INFO] [stdout] | [INFO] [stdout] 265 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:256:1 [INFO] [stdout] | [INFO] [stdout] 256 | / pub unsafe extern "C" fn extism_plugin_new( [INFO] [stdout] 257 | | ctx: *mut Context, [INFO] [stdout] 258 | | wasm: *const u8, [INFO] [stdout] 259 | | wasm_size: Size, [INFO] [stdout] ... | [INFO] [stdout] 262 | | with_wasi: bool, [INFO] [stdout] 263 | | ) -> PluginIndex { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:266:16 [INFO] [stdout] | [INFO] [stdout] 266 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:301:20 [INFO] [stdout] | [INFO] [stdout] 301 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:291:1 [INFO] [stdout] | [INFO] [stdout] 291 | / pub unsafe extern "C" fn extism_plugin_update( [INFO] [stdout] 292 | | ctx: *mut Context, [INFO] [stdout] 293 | | index: PluginIndex, [INFO] [stdout] 294 | | wasm: *const u8, [INFO] [stdout] ... | [INFO] [stdout] 298 | | with_wasi: bool, [INFO] [stdout] 299 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:303:16 [INFO] [stdout] | [INFO] [stdout] 303 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:349:20 [INFO] [stdout] | [INFO] [stdout] 349 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:342:1 [INFO] [stdout] | [INFO] [stdout] 342 | pub unsafe extern "C" fn extism_plugin_free(ctx: *mut Context, plugin: PluginIndex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:364:20 [INFO] [stdout] | [INFO] [stdout] 364 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:360:1 [INFO] [stdout] | [INFO] [stdout] 360 | / pub unsafe extern "C" fn extism_plugin_cancel_handle( [INFO] [stdout] 361 | | ctx: *mut Context, [INFO] [stdout] 362 | | plugin: PluginIndex, [INFO] [stdout] 363 | | ) -> *const ExtismCancelHandle { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:376:19 [INFO] [stdout] | [INFO] [stdout] 376 | let handle = &*handle; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:375:1 [INFO] [stdout] | [INFO] [stdout] 375 | pub unsafe extern "C" fn extism_plugin_cancel(handle: *const ExtismCancelHandle) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:387:20 [INFO] [stdout] | [INFO] [stdout] 387 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:386:1 [INFO] [stdout] | [INFO] [stdout] 386 | pub unsafe extern "C" fn extism_context_reset(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn extism_plugin_config( [INFO] [stdout] 400 | | ctx: *mut Context, [INFO] [stdout] 401 | | plugin: PluginIndex, [INFO] [stdout] 402 | | json: *const u8, [INFO] [stdout] 403 | | json_size: Size, [INFO] [stdout] 404 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:417:16 [INFO] [stdout] | [INFO] [stdout] 417 | let data = std::slice::from_raw_parts(json, json_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:464:20 [INFO] [stdout] | [INFO] [stdout] 464 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:459:1 [INFO] [stdout] | [INFO] [stdout] 459 | / pub unsafe extern "C" fn extism_plugin_function_exists( [INFO] [stdout] 460 | | ctx: *mut Context, [INFO] [stdout] 461 | | plugin: PluginIndex, [INFO] [stdout] 462 | | func_name: *const c_char, [INFO] [stdout] 463 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:470:16 [INFO] [stdout] | [INFO] [stdout] 470 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:496:20 [INFO] [stdout] | [INFO] [stdout] 496 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:489:1 [INFO] [stdout] | [INFO] [stdout] 489 | / pub unsafe extern "C" fn extism_plugin_call( [INFO] [stdout] 490 | | ctx: *mut Context, [INFO] [stdout] 491 | | plugin_id: PluginIndex, [INFO] [stdout] 492 | | func_name: *const c_char, [INFO] [stdout] 493 | | data: *const u8, [INFO] [stdout] 494 | | data_len: Size, [INFO] [stdout] 495 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:499:16 [INFO] [stdout] | [INFO] [stdout] 499 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:595:20 [INFO] [stdout] | [INFO] [stdout] 595 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:592:1 [INFO] [stdout] | [INFO] [stdout] 592 | pub unsafe extern "C" fn extism_error(ctx: *mut Context, plugin: PluginIndex) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:621:5 [INFO] [stdout] | [INFO] [stdout] 621 | plugin.memory_ptr().add(output[0].unwrap_i64() as usize) as *const _ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:632:20 [INFO] [stdout] | [INFO] [stdout] 632 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:626:1 [INFO] [stdout] | [INFO] [stdout] 626 | / pub unsafe extern "C" fn extism_plugin_output_length( [INFO] [stdout] 627 | | ctx: *mut Context, [INFO] [stdout] 628 | | plugin: PluginIndex, [INFO] [stdout] 629 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:659:20 [INFO] [stdout] | [INFO] [stdout] 659 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:653:1 [INFO] [stdout] | [INFO] [stdout] 653 | / pub unsafe extern "C" fn extism_plugin_output_data( [INFO] [stdout] 654 | | ctx: *mut Context, [INFO] [stdout] 655 | | plugin: PluginIndex, [INFO] [stdout] 656 | | ) -> *const u8 { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:667:26 [INFO] [stdout] | [INFO] [stdout] 667 | let mut store = &mut *(plugin.store_mut() as *mut Store<_>); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:679:5 [INFO] [stdout] | [INFO] [stdout] 679 | ptr.add(offs) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:695:20 [INFO] [stdout] | [INFO] [stdout] 695 | let file = std::ffi::CStr::from_ptr(filename); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:684:1 [INFO] [stdout] | [INFO] [stdout] 684 | / pub unsafe extern "C" fn extism_log_file( [INFO] [stdout] 685 | | filename: *const c_char, [INFO] [stdout] 686 | | log_level: *const c_char, [INFO] [stdout] 687 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:707:21 [INFO] [stdout] | [INFO] [stdout] 707 | let level = std::ffi::CStr::from_ptr(log_level); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:62:16 [INFO] [stdout] | [INFO] [stdout] 62 | if let Some(mem) = mem.into_memory() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:64:13 [INFO] [stdout] | [INFO] [stdout] 64 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 62 ~ match mem.into_memory() { Some(mem) => { [INFO] [stdout] 63 | return mem.data_ptr(&mut store); [INFO] [stdout] 64 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:165:16 [INFO] [stdout] | [INFO] [stdout] 165 | if let Some(f) = linker.get(&mut store, "env", "extism_error_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:170:13 [INFO] [stdout] | [INFO] [stdout] 170 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 165 ~ match linker.get(&mut store, "env", "extism_error_set") { Some(f) => { [INFO] [stdout] 166 | f.into_func() [INFO] [stdout] ... [INFO] [stdout] 169 | .unwrap(); [INFO] [stdout] 170 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:177:12 [INFO] [stdout] | [INFO] [stdout] 177 | if let Some(f) = linker.get(&mut store, "env", "extism_error_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 177 ~ match linker.get(&mut store, "env", "extism_error_set") { Some(f) => { [INFO] [stdout] 178 | f.into_func() [INFO] [stdout] ... [INFO] [stdout] 181 | .unwrap(); [INFO] [stdout] 182 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/manifest.rs:126:20 [INFO] [stdout] | [INFO] [stdout] 126 | if let Ok(Some(data)) = cache_get_file(h) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/manifest.rs:130:17 [INFO] [stdout] | [INFO] [stdout] 130 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 126 ~ match cache_get_file(h) { Ok(Some(data)) => { [INFO] [stdout] 127 | check_hash(&meta.hash, &data)?; [INFO] [stdout] 128 | let module = Module::new(engine, data)?; [INFO] [stdout] 129 | return Ok((name.to_string(), module)); [INFO] [stdout] 130 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/pdk.rs:204:20 [INFO] [stdout] | [INFO] [stdout] 204 | if let Some(res) = e.into_response() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/pdk.rs:207:17 [INFO] [stdout] | [INFO] [stdout] 207 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 204 ~ match e.into_response() { Some(res) => { [INFO] [stdout] 205 | data.http_status = res.status(); [INFO] [stdout] 206 | Some(res.into_reader()) [INFO] [stdout] 207 ~ } _ => { [INFO] [stdout] 208 | None [INFO] [stdout] 209 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/pdk.rs:213:12 [INFO] [stdout] | [INFO] [stdout] 213 | if let Some(reader) = reader { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/pdk.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 213 ~ match reader { Some(reader) => { [INFO] [stdout] 214 | let mut buf = Vec::new(); [INFO] [stdout] ... [INFO] [stdout] 220 | output[0] = Val::I64(mem as i64); [INFO] [stdout] 221 ~ } _ => { [INFO] [stdout] 222 | output[0] = Val::I64(0); [INFO] [stdout] 223 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | if let Some(memory) = export.ty().memory() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^-----------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:105:13 [INFO] [stdout] | [INFO] [stdout] 105 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 87 ~ match export.ty().memory() { Some(memory) => { [INFO] [stdout] 88 | memories += 1; [INFO] [stdout] ... [INFO] [stdout] 104 | } [INFO] [stdout] 105 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:311:16 [INFO] [stdout] | [INFO] [stdout] 311 | if let Err(e) = self.instantiate() { [INFO] [stdout] | ^^^^^^^^^^^^^------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:314:13 [INFO] [stdout] | [INFO] [stdout] 314 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 311 ~ match self.instantiate() { Err(e) => { [INFO] [stdout] 312 | error!("Unable to instantiate: {e}"); [INFO] [stdout] 313 | return None; [INFO] [stdout] 314 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:342:16 [INFO] [stdout] | [INFO] [stdout] 342 | if let Some(f) = self.linker.get(&mut self.store, "env", "extism_reset") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:344:13 [INFO] [stdout] | [INFO] [stdout] 344 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 342 ~ match self.linker.get(&mut self.store, "env", "extism_reset") { Some(f) => { [INFO] [stdout] 343 | f.into_func().unwrap().call(&mut self.store, &[], &mut [])?; [INFO] [stdout] 344 ~ } _ => { [INFO] [stdout] 345 | error!("Call to extism_reset failed"); [INFO] [stdout] 346 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:350:16 [INFO] [stdout] | [INFO] [stdout] 350 | if let Some(f) = self.linker.get(&mut self.store, "env", "extism_input_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^----------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:356:13 [INFO] [stdout] | [INFO] [stdout] 356 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 350 ~ match self.linker.get(&mut self.store, "env", "extism_input_set") { Some(f) => { [INFO] [stdout] 351 | f.into_func().unwrap().call( [INFO] [stdout] ... [INFO] [stdout] 355 | )?; [INFO] [stdout] 356 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:19:16 [INFO] [stdout] | [INFO] [stdout] 19 | if let Err(e) = plugin.reset_store() { [INFO] [stdout] | ^^^^^^^^^^^^^-------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:21:13 [INFO] [stdout] | [INFO] [stdout] 21 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 19 ~ match plugin.reset_store() { Err(e) => { [INFO] [stdout] 20 | error!("Call to Plugin::reset_store failed: {e:?}"); [INFO] [stdout] 21 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:26:16 [INFO] [stdout] | [INFO] [stdout] 26 | if let Err(e) = plugin.instantiate() { [INFO] [stdout] | ^^^^^^^^^^^^^-------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:29:13 [INFO] [stdout] | [INFO] [stdout] 29 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 26 ~ match plugin.instantiate() { Err(e) => { [INFO] [stdout] 27 | error!("Plugin::instantiate failed: {e:?}"); [INFO] [stdout] 28 | plugin.error(e, ()); [INFO] [stdout] 29 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:89:16 [INFO] [stdout] | [INFO] [stdout] 89 | if let Err(e) = plugin.stop_timer() { [INFO] [stdout] | ^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:92:13 [INFO] [stdout] | [INFO] [stdout] 92 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match plugin.stop_timer() { Err(e) => { [INFO] [stdout] 90 | let id = plugin.timer_id; [INFO] [stdout] 91 | error!("Failed to stop timeout manager for {id}: {e:?}"); [INFO] [stdout] 92 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:65:24 [INFO] [stdout] | [INFO] [stdout] 65 | if let Ok(x) = rx.recv() { [INFO] [stdout] | ^^^^^^^^^^^^--------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:67:21 [INFO] [stdout] | [INFO] [stdout] 67 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 65 ~ match rx.recv() { Ok(x) => { [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] 67 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | if let Some((engine, _)) = plugins.remove(&id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:51:29 [INFO] [stdout] | [INFO] [stdout] 51 | } [INFO] [stdout] | ^ [INFO] [stdout] ... [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `handle` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | if let Some((engine, _)) = plugins.remove(&id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 85 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:51:29 [INFO] [stdout] | [INFO] [stdout] 51 | } [INFO] [stdout] | ^ [INFO] [stdout] ... [INFO] [stdout] 85 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `handle` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:106:12 [INFO] [stdout] | [INFO] [stdout] 106 | if let Some(thread) = self.thread.take() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:108:9 [INFO] [stdout] | [INFO] [stdout] 108 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 106 ~ match self.thread.take() { Some(thread) => { [INFO] [stdout] 107 | let _ = thread.join(); [INFO] [stdout] 108 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 85 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `extism_runtime` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/pdk.rs [INFO] [stderr] * src/plugin.rs [INFO] [stderr] * src/sdk.rs [INFO] [stderr] * src/timer.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:8:6 [INFO] [stderr] | [INFO] [stderr] 8 | ($input:expr_2021, $index:expr_2021, $ty:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:8:24 [INFO] [stderr] | [INFO] [stderr] 8 | ($input:expr_2021, $index:expr_2021, $ty:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:14:6 [INFO] [stderr] | [INFO] [stderr] 14 | ($input:expr_2021, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/pdk.rs:14:27 [INFO] [stderr] | [INFO] [stderr] 14 | ($input:expr_2021, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:14 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:46 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/plugin.rs:179:73 [INFO] [stderr] | [INFO] [stderr] 179 | ($m:expr_2021, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/timer.rs:35:18 [INFO] [stderr] | [INFO] [stderr] 35 | ($x:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sdk.rs:271:13 [INFO] [stderr] | [INFO] [stderr] 263 | ) -> PluginIndex { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 271 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/sdk.rs:309:13 [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:77:3 [INFO] [stdout] | [INFO] [stdout] 77 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 77 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] 299 | ) -> bool { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 309 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 8 previous errors; 2 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:84:3 [INFO] [stdout] | [INFO] [stdout] 84 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 84 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:95:3 [INFO] [stdout] | [INFO] [stdout] 95 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 95 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:107:3 [INFO] [stdout] | [INFO] [stdout] 107 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 107 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:119:3 [INFO] [stdout] | [INFO] [stdout] 119 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 119 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:134:3 [INFO] [stdout] | [INFO] [stdout] 134 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 134 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:159:3 [INFO] [stdout] | [INFO] [stdout] 159 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 159 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:232:3 [INFO] [stdout] | [INFO] [stdout] 232 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 232 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:243:3 [INFO] [stdout] | [INFO] [stdout] 243 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 243 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:255:3 [INFO] [stdout] | [INFO] [stdout] 255 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 255 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:290:3 [INFO] [stdout] | [INFO] [stdout] 290 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 290 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:341:3 [INFO] [stdout] | [INFO] [stdout] 341 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 341 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:359:3 [INFO] [stdout] | [INFO] [stdout] 359 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 359 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:374:3 [INFO] [stdout] | [INFO] [stdout] 374 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 374 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:385:3 [INFO] [stdout] | [INFO] [stdout] 385 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 385 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:458:3 [INFO] [stdout] | [INFO] [stdout] 458 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 458 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:488:3 [INFO] [stdout] | [INFO] [stdout] 488 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 488 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:591:3 [INFO] [stdout] | [INFO] [stdout] 591 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 591 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:625:3 [INFO] [stdout] | [INFO] [stdout] 625 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 625 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:652:3 [INFO] [stdout] | [INFO] [stdout] 652 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 652 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:683:3 [INFO] [stdout] | [INFO] [stdout] 683 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 683 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:769:3 [INFO] [stdout] | [INFO] [stdout] 769 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 769 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:8:13 [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr, $ty:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr_2021, $index:expr, $ty:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:8:26 [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr, $ty:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 8 | ($input:expr, $index:expr_2021, $ty:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:14:13 [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr_2021, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/pdk.rs:14:29 [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 14 | ($input:expr, $(($index:expr_2021, $ty:ident)),*$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:17 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr_2021, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:47 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr_2021),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/plugin.rs:179:66 [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr),*)?);* $(;)?}) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 179 | ($m:expr, { $($name:ident($($args:expr),*) $(-> $($r:expr_2021),*)?);* $(;)?}) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/timer.rs:35:21 [INFO] [stdout] | [INFO] [stdout] 35 | ($x:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($x:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:90:10 [INFO] [stdout] | [INFO] [stdout] 90 | drop(Box::from_raw(ctx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:85:1 [INFO] [stdout] | [INFO] [stdout] 85 | pub unsafe extern "C" fn extism_context_free(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:101:23 [INFO] [stdout] | [INFO] [stdout] 101 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe extern "C" fn extism_current_plugin_memory(plugin: *mut Internal) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:113:23 [INFO] [stdout] | [INFO] [stdout] 113 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:108:1 [INFO] [stdout] | [INFO] [stdout] 108 | pub unsafe extern "C" fn extism_current_plugin_memory_alloc(plugin: *mut Internal, n: Size) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:128:23 [INFO] [stdout] | [INFO] [stdout] 128 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:120:1 [INFO] [stdout] | [INFO] [stdout] 120 | / pub unsafe extern "C" fn extism_current_plugin_memory_length( [INFO] [stdout] 121 | | plugin: *mut Internal, [INFO] [stdout] 122 | | n: Size, [INFO] [stdout] 123 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:135:1 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe extern "C" fn extism_current_plugin_memory_free(plugin: *mut Internal, ptr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let name = match std::ffi::CStr::from_ptr(name).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | / pub unsafe extern "C" fn extism_function_new( [INFO] [stdout] 161 | | name: *const std::ffi::c_char, [INFO] [stdout] 162 | | inputs: *const ValType, [INFO] [stdout] 163 | | n_inputs: Size, [INFO] [stdout] ... | [INFO] [stdout] 168 | | free_user_data: Option, [INFO] [stdout] 169 | | ) -> *mut ExtismFunction { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:180:9 [INFO] [stdout] | [INFO] [stdout] 180 | std::slice::from_raw_parts(inputs, n_inputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:187:9 [INFO] [stdout] | [INFO] [stdout] 187 | std::slice::from_raw_parts(outputs, n_outputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:218:53 [INFO] [stdout] | [INFO] [stdout] 218 | ValType::I32 => *out = Val::I32(tmp.v.i32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:219:53 [INFO] [stdout] | [INFO] [stdout] 219 | ValType::I64 => *out = Val::I64(tmp.v.i64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:220:53 [INFO] [stdout] | [INFO] [stdout] 220 | ValType::F32 => *out = Val::F32(tmp.v.f32 as u32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | ValType::F64 => *out = Val::F64(tmp.v.f64 as u64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:237:21 [INFO] [stdout] | [INFO] [stdout] 237 | let namespace = std::ffi::CStr::from_ptr(namespace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | / pub unsafe extern "C" fn extism_function_set_namespace( [INFO] [stdout] 234 | | ptr: *mut ExtismFunction, [INFO] [stdout] 235 | | namespace: *const std::ffi::c_char, [INFO] [stdout] 236 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:238:18 [INFO] [stdout] | [INFO] [stdout] 238 | let f = &mut *ptr; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:245:10 [INFO] [stdout] | [INFO] [stdout] 245 | drop(Box::from_raw(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe extern "C" fn extism_function_free(ptr: *mut ExtismFunction) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:265:20 [INFO] [stdout] | [INFO] [stdout] 265 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:256:1 [INFO] [stdout] | [INFO] [stdout] 256 | / pub unsafe extern "C" fn extism_plugin_new( [INFO] [stdout] 257 | | ctx: *mut Context, [INFO] [stdout] 258 | | wasm: *const u8, [INFO] [stdout] 259 | | wasm_size: Size, [INFO] [stdout] ... | [INFO] [stdout] 262 | | with_wasi: bool, [INFO] [stdout] 263 | | ) -> PluginIndex { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:266:16 [INFO] [stdout] | [INFO] [stdout] 266 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:301:20 [INFO] [stdout] | [INFO] [stdout] 301 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:291:1 [INFO] [stdout] | [INFO] [stdout] 291 | / pub unsafe extern "C" fn extism_plugin_update( [INFO] [stdout] 292 | | ctx: *mut Context, [INFO] [stdout] 293 | | index: PluginIndex, [INFO] [stdout] 294 | | wasm: *const u8, [INFO] [stdout] ... | [INFO] [stdout] 298 | | with_wasi: bool, [INFO] [stdout] 299 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:303:16 [INFO] [stdout] | [INFO] [stdout] 303 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:349:20 [INFO] [stdout] | [INFO] [stdout] 349 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:342:1 [INFO] [stdout] | [INFO] [stdout] 342 | pub unsafe extern "C" fn extism_plugin_free(ctx: *mut Context, plugin: PluginIndex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:364:20 [INFO] [stdout] | [INFO] [stdout] 364 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:360:1 [INFO] [stdout] | [INFO] [stdout] 360 | / pub unsafe extern "C" fn extism_plugin_cancel_handle( [INFO] [stdout] 361 | | ctx: *mut Context, [INFO] [stdout] 362 | | plugin: PluginIndex, [INFO] [stdout] 363 | | ) -> *const ExtismCancelHandle { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:376:19 [INFO] [stdout] | [INFO] [stdout] 376 | let handle = &*handle; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:375:1 [INFO] [stdout] | [INFO] [stdout] 375 | pub unsafe extern "C" fn extism_plugin_cancel(handle: *const ExtismCancelHandle) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:387:20 [INFO] [stdout] | [INFO] [stdout] 387 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:386:1 [INFO] [stdout] | [INFO] [stdout] 386 | pub unsafe extern "C" fn extism_context_reset(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn extism_plugin_config( [INFO] [stdout] 400 | | ctx: *mut Context, [INFO] [stdout] 401 | | plugin: PluginIndex, [INFO] [stdout] 402 | | json: *const u8, [INFO] [stdout] 403 | | json_size: Size, [INFO] [stdout] 404 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:417:16 [INFO] [stdout] | [INFO] [stdout] 417 | let data = std::slice::from_raw_parts(json, json_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:464:20 [INFO] [stdout] | [INFO] [stdout] 464 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:459:1 [INFO] [stdout] | [INFO] [stdout] 459 | / pub unsafe extern "C" fn extism_plugin_function_exists( [INFO] [stdout] 460 | | ctx: *mut Context, [INFO] [stdout] 461 | | plugin: PluginIndex, [INFO] [stdout] 462 | | func_name: *const c_char, [INFO] [stdout] 463 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:470:16 [INFO] [stdout] | [INFO] [stdout] 470 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:496:20 [INFO] [stdout] | [INFO] [stdout] 496 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:489:1 [INFO] [stdout] | [INFO] [stdout] 489 | / pub unsafe extern "C" fn extism_plugin_call( [INFO] [stdout] 490 | | ctx: *mut Context, [INFO] [stdout] 491 | | plugin_id: PluginIndex, [INFO] [stdout] 492 | | func_name: *const c_char, [INFO] [stdout] 493 | | data: *const u8, [INFO] [stdout] 494 | | data_len: Size, [INFO] [stdout] 495 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:499:16 [INFO] [stdout] | [INFO] [stdout] 499 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:595:20 [INFO] [stdout] | [INFO] [stdout] 595 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:592:1 [INFO] [stdout] | [INFO] [stdout] 592 | pub unsafe extern "C" fn extism_error(ctx: *mut Context, plugin: PluginIndex) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:621:5 [INFO] [stdout] | [INFO] [stdout] 621 | plugin.memory_ptr().add(output[0].unwrap_i64() as usize) as *const _ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:632:20 [INFO] [stdout] | [INFO] [stdout] 632 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:626:1 [INFO] [stdout] | [INFO] [stdout] 626 | / pub unsafe extern "C" fn extism_plugin_output_length( [INFO] [stdout] 627 | | ctx: *mut Context, [INFO] [stdout] 628 | | plugin: PluginIndex, [INFO] [stdout] 629 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:659:20 [INFO] [stdout] | [INFO] [stdout] 659 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:653:1 [INFO] [stdout] | [INFO] [stdout] 653 | / pub unsafe extern "C" fn extism_plugin_output_data( [INFO] [stdout] 654 | | ctx: *mut Context, [INFO] [stdout] 655 | | plugin: PluginIndex, [INFO] [stdout] 656 | | ) -> *const u8 { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:667:26 [INFO] [stdout] | [INFO] [stdout] 667 | let mut store = &mut *(plugin.store_mut() as *mut Store<_>); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:679:5 [INFO] [stdout] | [INFO] [stdout] 679 | ptr.add(offs) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:695:20 [INFO] [stdout] | [INFO] [stdout] 695 | let file = std::ffi::CStr::from_ptr(filename); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:684:1 [INFO] [stdout] | [INFO] [stdout] 684 | / pub unsafe extern "C" fn extism_log_file( [INFO] [stdout] 685 | | filename: *const c_char, [INFO] [stdout] 686 | | log_level: *const c_char, [INFO] [stdout] 687 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:707:21 [INFO] [stdout] | [INFO] [stdout] 707 | let level = std::ffi::CStr::from_ptr(log_level); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:62:16 [INFO] [stdout] | [INFO] [stdout] 62 | if let Some(mem) = mem.into_memory() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:64:13 [INFO] [stdout] | [INFO] [stdout] 64 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 62 ~ match mem.into_memory() { Some(mem) => { [INFO] [stdout] 63 | return mem.data_ptr(&mut store); [INFO] [stdout] 64 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:165:16 [INFO] [stdout] | [INFO] [stdout] 165 | if let Some(f) = linker.get(&mut store, "env", "extism_error_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:170:13 [INFO] [stdout] | [INFO] [stdout] 170 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 165 ~ match linker.get(&mut store, "env", "extism_error_set") { Some(f) => { [INFO] [stdout] 166 | f.into_func() [INFO] [stdout] ... [INFO] [stdout] 169 | .unwrap(); [INFO] [stdout] 170 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/internal.rs:177:12 [INFO] [stdout] | [INFO] [stdout] 177 | if let Some(f) = linker.get(&mut store, "env", "extism_error_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/internal.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 177 ~ match linker.get(&mut store, "env", "extism_error_set") { Some(f) => { [INFO] [stdout] 178 | f.into_func() [INFO] [stdout] ... [INFO] [stdout] 181 | .unwrap(); [INFO] [stdout] 182 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/manifest.rs:126:20 [INFO] [stdout] | [INFO] [stdout] 126 | if let Ok(Some(data)) = cache_get_file(h) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/manifest.rs:130:17 [INFO] [stdout] | [INFO] [stdout] 130 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 126 ~ match cache_get_file(h) { Ok(Some(data)) => { [INFO] [stdout] 127 | check_hash(&meta.hash, &data)?; [INFO] [stdout] 128 | let module = Module::new(engine, data)?; [INFO] [stdout] 129 | return Ok((name.to_string(), module)); [INFO] [stdout] 130 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/pdk.rs:204:20 [INFO] [stdout] | [INFO] [stdout] 204 | if let Some(res) = e.into_response() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/pdk.rs:207:17 [INFO] [stdout] | [INFO] [stdout] 207 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 204 ~ match e.into_response() { Some(res) => { [INFO] [stdout] 205 | data.http_status = res.status(); [INFO] [stdout] 206 | Some(res.into_reader()) [INFO] [stdout] 207 ~ } _ => { [INFO] [stdout] 208 | None [INFO] [stdout] 209 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/pdk.rs:213:12 [INFO] [stdout] | [INFO] [stdout] 213 | if let Some(reader) = reader { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/pdk.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 213 ~ match reader { Some(reader) => { [INFO] [stdout] 214 | let mut buf = Vec::new(); [INFO] [stdout] ... [INFO] [stdout] 220 | output[0] = Val::I64(mem as i64); [INFO] [stdout] 221 ~ } _ => { [INFO] [stdout] 222 | output[0] = Val::I64(0); [INFO] [stdout] 223 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | if let Some(memory) = export.ty().memory() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^-----------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:105:13 [INFO] [stdout] | [INFO] [stdout] 105 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 87 ~ match export.ty().memory() { Some(memory) => { [INFO] [stdout] 88 | memories += 1; [INFO] [stdout] ... [INFO] [stdout] 104 | } [INFO] [stdout] 105 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:311:16 [INFO] [stdout] | [INFO] [stdout] 311 | if let Err(e) = self.instantiate() { [INFO] [stdout] | ^^^^^^^^^^^^^------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:314:13 [INFO] [stdout] | [INFO] [stdout] 314 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 311 ~ match self.instantiate() { Err(e) => { [INFO] [stdout] 312 | error!("Unable to instantiate: {e}"); [INFO] [stdout] 313 | return None; [INFO] [stdout] 314 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:342:16 [INFO] [stdout] | [INFO] [stdout] 342 | if let Some(f) = self.linker.get(&mut self.store, "env", "extism_reset") { [INFO] [stdout] | ^^^^^^^^^^^^^^------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:344:13 [INFO] [stdout] | [INFO] [stdout] 344 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 342 ~ match self.linker.get(&mut self.store, "env", "extism_reset") { Some(f) => { [INFO] [stdout] 343 | f.into_func().unwrap().call(&mut self.store, &[], &mut [])?; [INFO] [stdout] 344 ~ } _ => { [INFO] [stdout] 345 | error!("Call to extism_reset failed"); [INFO] [stdout] 346 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin.rs:350:16 [INFO] [stdout] | [INFO] [stdout] 350 | if let Some(f) = self.linker.get(&mut self.store, "env", "extism_input_set") { [INFO] [stdout] | ^^^^^^^^^^^^^^----------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin.rs:356:13 [INFO] [stdout] | [INFO] [stdout] 356 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 350 ~ match self.linker.get(&mut self.store, "env", "extism_input_set") { Some(f) => { [INFO] [stdout] 351 | f.into_func().unwrap().call( [INFO] [stdout] ... [INFO] [stdout] 355 | )?; [INFO] [stdout] 356 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:19:16 [INFO] [stdout] | [INFO] [stdout] 19 | if let Err(e) = plugin.reset_store() { [INFO] [stdout] | ^^^^^^^^^^^^^-------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:21:13 [INFO] [stdout] | [INFO] [stdout] 21 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 19 ~ match plugin.reset_store() { Err(e) => { [INFO] [stdout] 20 | error!("Call to Plugin::reset_store failed: {e:?}"); [INFO] [stdout] 21 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:26:16 [INFO] [stdout] | [INFO] [stdout] 26 | if let Err(e) = plugin.instantiate() { [INFO] [stdout] | ^^^^^^^^^^^^^-------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:29:13 [INFO] [stdout] | [INFO] [stdout] 29 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 26 ~ match plugin.instantiate() { Err(e) => { [INFO] [stdout] 27 | error!("Plugin::instantiate failed: {e:?}"); [INFO] [stdout] 28 | plugin.error(e, ()); [INFO] [stdout] 29 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:89:16 [INFO] [stdout] | [INFO] [stdout] 89 | if let Err(e) = plugin.stop_timer() { [INFO] [stdout] | ^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/plugin_ref.rs:92:13 [INFO] [stdout] | [INFO] [stdout] 92 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match plugin.stop_timer() { Err(e) => { [INFO] [stdout] 90 | let id = plugin.timer_id; [INFO] [stdout] 91 | error!("Failed to stop timeout manager for {id}: {e:?}"); [INFO] [stdout] 92 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:65:24 [INFO] [stdout] | [INFO] [stdout] 65 | if let Ok(x) = rx.recv() { [INFO] [stdout] | ^^^^^^^^^^^^--------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:67:21 [INFO] [stdout] | [INFO] [stdout] 67 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 65 ~ match rx.recv() { Ok(x) => { [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] 67 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | if let Some((engine, _)) = plugins.remove(&id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:51:29 [INFO] [stdout] | [INFO] [stdout] 51 | } [INFO] [stdout] | ^ [INFO] [stdout] ... [INFO] [stdout] 66 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `handle` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:49:32 [INFO] [stdout] | [INFO] [stdout] 49 | if let Some((engine, _)) = plugins.remove(&id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 85 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:51:29 [INFO] [stdout] | [INFO] [stdout] 51 | } [INFO] [stdout] | ^ [INFO] [stdout] ... [INFO] [stdout] 85 | handle!(x) [INFO] [stdout] | ---------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `handle` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/timer.rs:106:12 [INFO] [stdout] | [INFO] [stdout] 106 | if let Some(thread) = self.thread.take() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/timer.rs:108:9 [INFO] [stdout] | [INFO] [stdout] 108 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 106 ~ match self.thread.take() { Some(thread) => { [INFO] [stdout] 107 | let _ = thread.join(); [INFO] [stdout] 108 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 85 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 32.68s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Compiling extism-runtime v0.5.5 (/tmp/fixit) [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:77:3 [INFO] [stdout] | [INFO] [stdout] 77 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 77 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:77:3 [INFO] [stdout] | [INFO] [stdout] 77 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 77 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:84:3 [INFO] [stdout] | [INFO] [stdout] 84 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 84 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:84:3 [INFO] [stdout] | [INFO] [stdout] 84 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 84 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:95:3 [INFO] [stdout] | [INFO] [stdout] 95 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 95 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:95:3 [INFO] [stdout] | [INFO] [stdout] 95 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 95 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:107:3 [INFO] [stdout] | [INFO] [stdout] 107 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 107 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:107:3 [INFO] [stdout] | [INFO] [stdout] 107 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 107 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:119:3 [INFO] [stdout] | [INFO] [stdout] 119 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 119 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:134:3 [INFO] [stdout] | [INFO] [stdout] 134 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 134 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:119:3 [INFO] [stdout] | [INFO] [stdout] 119 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 119 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:159:3 [INFO] [stdout] | [INFO] [stdout] 159 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 159 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:134:3 [INFO] [stdout] | [INFO] [stdout] 134 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 134 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:232:3 [INFO] [stdout] | [INFO] [stdout] 232 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 232 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:159:3 [INFO] [stdout] | [INFO] [stdout] 159 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 159 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:243:3 [INFO] [stdout] | [INFO] [stdout] 243 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 243 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:255:3 [INFO] [stdout] | [INFO] [stdout] 255 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 255 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:232:3 [INFO] [stdout] | [INFO] [stdout] 232 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 232 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:290:3 [INFO] [stdout] | [INFO] [stdout] 290 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 290 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:243:3 [INFO] [stdout] | [INFO] [stdout] 243 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 243 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:341:3 [INFO] [stdout] | [INFO] [stdout] 341 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 341 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:255:3 [INFO] [stdout] | [INFO] [stdout] 255 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 255 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:359:3 [INFO] [stdout] | [INFO] [stdout] 359 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 359 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:290:3 [INFO] [stdout] | [INFO] [stdout] 290 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 290 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:374:3 [INFO] [stdout] | [INFO] [stdout] 374 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 374 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:385:3 [INFO] [stdout] | [INFO] [stdout] 385 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 385 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:341:3 [INFO] [stdout] | [INFO] [stdout] 341 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 341 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:359:3 [INFO] [stdout] | [INFO] [stdout] 359 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 359 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:458:3 [INFO] [stdout] | [INFO] [stdout] 458 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 458 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:374:3 [INFO] [stdout] | [INFO] [stdout] 374 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 374 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:488:3 [INFO] [stdout] | [INFO] [stdout] 488 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 488 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:385:3 [INFO] [stdout] | [INFO] [stdout] 385 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 385 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:591:3 [INFO] [stdout] | [INFO] [stdout] 591 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 591 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:625:3 [INFO] [stdout] | [INFO] [stdout] 625 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 625 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:458:3 [INFO] [stdout] | [INFO] [stdout] 458 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 458 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:488:3 [INFO] [stdout] | [INFO] [stdout] 488 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 488 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:652:3 [INFO] [stdout] | [INFO] [stdout] 652 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 652 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:591:3 [INFO] [stdout] | [INFO] [stdout] 591 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 591 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:683:3 [INFO] [stdout] | [INFO] [stdout] 683 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 683 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:625:3 [INFO] [stdout] | [INFO] [stdout] 625 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 625 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:769:3 [INFO] [stdout] | [INFO] [stdout] 769 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 769 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:652:3 [INFO] [stdout] | [INFO] [stdout] 652 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 652 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:683:3 [INFO] [stdout] | [INFO] [stdout] 683 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 683 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/sdk.rs:769:3 [INFO] [stdout] | [INFO] [stdout] 769 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 769 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:90:10 [INFO] [stdout] | [INFO] [stdout] 90 | drop(Box::from_raw(ctx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:85:1 [INFO] [stdout] | [INFO] [stdout] 85 | pub unsafe extern "C" fn extism_context_free(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:101:23 [INFO] [stdout] | [INFO] [stdout] 101 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe extern "C" fn extism_current_plugin_memory(plugin: *mut Internal) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:113:23 [INFO] [stdout] | [INFO] [stdout] 113 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:108:1 [INFO] [stdout] | [INFO] [stdout] 108 | pub unsafe extern "C" fn extism_current_plugin_memory_alloc(plugin: *mut Internal, n: Size) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:128:23 [INFO] [stdout] | [INFO] [stdout] 128 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:120:1 [INFO] [stdout] | [INFO] [stdout] 120 | / pub unsafe extern "C" fn extism_current_plugin_memory_length( [INFO] [stdout] 121 | | plugin: *mut Internal, [INFO] [stdout] 122 | | n: Size, [INFO] [stdout] 123 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:135:1 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe extern "C" fn extism_current_plugin_memory_free(plugin: *mut Internal, ptr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let name = match std::ffi::CStr::from_ptr(name).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | / pub unsafe extern "C" fn extism_function_new( [INFO] [stdout] 161 | | name: *const std::ffi::c_char, [INFO] [stdout] 162 | | inputs: *const ValType, [INFO] [stdout] 163 | | n_inputs: Size, [INFO] [stdout] ... | [INFO] [stdout] 168 | | free_user_data: Option, [INFO] [stdout] 169 | | ) -> *mut ExtismFunction { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:180:9 [INFO] [stdout] | [INFO] [stdout] 180 | std::slice::from_raw_parts(inputs, n_inputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:187:9 [INFO] [stdout] | [INFO] [stdout] 187 | std::slice::from_raw_parts(outputs, n_outputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:218:53 [INFO] [stdout] | [INFO] [stdout] 218 | ValType::I32 => *out = Val::I32(tmp.v.i32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:219:53 [INFO] [stdout] | [INFO] [stdout] 219 | ValType::I64 => *out = Val::I64(tmp.v.i64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:220:53 [INFO] [stdout] | [INFO] [stdout] 220 | ValType::F32 => *out = Val::F32(tmp.v.f32 as u32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | ValType::F64 => *out = Val::F64(tmp.v.f64 as u64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:237:21 [INFO] [stdout] | [INFO] [stdout] 237 | let namespace = std::ffi::CStr::from_ptr(namespace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | / pub unsafe extern "C" fn extism_function_set_namespace( [INFO] [stdout] 234 | | ptr: *mut ExtismFunction, [INFO] [stdout] 235 | | namespace: *const std::ffi::c_char, [INFO] [stdout] 236 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:238:18 [INFO] [stdout] | [INFO] [stdout] 238 | let f = &mut *ptr; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:245:10 [INFO] [stdout] | [INFO] [stdout] 245 | drop(Box::from_raw(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe extern "C" fn extism_function_free(ptr: *mut ExtismFunction) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:265:20 [INFO] [stdout] | [INFO] [stdout] 265 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:256:1 [INFO] [stdout] | [INFO] [stdout] 256 | / pub unsafe extern "C" fn extism_plugin_new( [INFO] [stdout] 257 | | ctx: *mut Context, [INFO] [stdout] 258 | | wasm: *const u8, [INFO] [stdout] 259 | | wasm_size: Size, [INFO] [stdout] ... | [INFO] [stdout] 262 | | with_wasi: bool, [INFO] [stdout] 263 | | ) -> PluginIndex { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:266:16 [INFO] [stdout] | [INFO] [stdout] 266 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:301:20 [INFO] [stdout] | [INFO] [stdout] 301 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:291:1 [INFO] [stdout] | [INFO] [stdout] 291 | / pub unsafe extern "C" fn extism_plugin_update( [INFO] [stdout] 292 | | ctx: *mut Context, [INFO] [stdout] 293 | | index: PluginIndex, [INFO] [stdout] 294 | | wasm: *const u8, [INFO] [stdout] ... | [INFO] [stdout] 298 | | with_wasi: bool, [INFO] [stdout] 299 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:303:16 [INFO] [stdout] | [INFO] [stdout] 303 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:90:10 [INFO] [stdout] | [INFO] [stdout] 90 | drop(Box::from_raw(ctx)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:85:1 [INFO] [stdout] | [INFO] [stdout] 85 | pub unsafe extern "C" fn extism_context_free(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:101:23 [INFO] [stdout] | [INFO] [stdout] 101 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe extern "C" fn extism_current_plugin_memory(plugin: *mut Internal) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:113:23 [INFO] [stdout] | [INFO] [stdout] 113 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:108:1 [INFO] [stdout] | [INFO] [stdout] 108 | pub unsafe extern "C" fn extism_current_plugin_memory_alloc(plugin: *mut Internal, n: Size) -> u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:349:20 [INFO] [stdout] | [INFO] [stdout] 349 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:342:1 [INFO] [stdout] | [INFO] [stdout] 342 | pub unsafe extern "C" fn extism_plugin_free(ctx: *mut Context, plugin: PluginIndex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:128:23 [INFO] [stdout] | [INFO] [stdout] 128 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:120:1 [INFO] [stdout] | [INFO] [stdout] 120 | / pub unsafe extern "C" fn extism_current_plugin_memory_length( [INFO] [stdout] 121 | | plugin: *mut Internal, [INFO] [stdout] 122 | | n: Size, [INFO] [stdout] 123 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:364:20 [INFO] [stdout] | [INFO] [stdout] 364 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:360:1 [INFO] [stdout] | [INFO] [stdout] 360 | / pub unsafe extern "C" fn extism_plugin_cancel_handle( [INFO] [stdout] 361 | | ctx: *mut Context, [INFO] [stdout] 362 | | plugin: PluginIndex, [INFO] [stdout] 363 | | ) -> *const ExtismCancelHandle { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:140:23 [INFO] [stdout] | [INFO] [stdout] 140 | let plugin = &mut *plugin; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:135:1 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe extern "C" fn extism_current_plugin_memory_free(plugin: *mut Internal, ptr: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:376:19 [INFO] [stdout] | [INFO] [stdout] 376 | let handle = &*handle; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:375:1 [INFO] [stdout] | [INFO] [stdout] 375 | pub unsafe extern "C" fn extism_plugin_cancel(handle: *const ExtismCancelHandle) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let name = match std::ffi::CStr::from_ptr(name).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | / pub unsafe extern "C" fn extism_function_new( [INFO] [stdout] 161 | | name: *const std::ffi::c_char, [INFO] [stdout] 162 | | inputs: *const ValType, [INFO] [stdout] 163 | | n_inputs: Size, [INFO] [stdout] ... | [INFO] [stdout] 168 | | free_user_data: Option, [INFO] [stdout] 169 | | ) -> *mut ExtismFunction { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:180:9 [INFO] [stdout] | [INFO] [stdout] 180 | std::slice::from_raw_parts(inputs, n_inputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:187:9 [INFO] [stdout] | [INFO] [stdout] 187 | std::slice::from_raw_parts(outputs, n_outputs as usize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:387:20 [INFO] [stdout] | [INFO] [stdout] 387 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:386:1 [INFO] [stdout] | [INFO] [stdout] 386 | pub unsafe extern "C" fn extism_context_reset(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:218:53 [INFO] [stdout] | [INFO] [stdout] 218 | ValType::I32 => *out = Val::I32(tmp.v.i32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:219:53 [INFO] [stdout] | [INFO] [stdout] 219 | ValType::I64 => *out = Val::I64(tmp.v.i64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:220:53 [INFO] [stdout] | [INFO] [stdout] 220 | ValType::F32 => *out = Val::F32(tmp.v.f32 as u32), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | ValType::F64 => *out = Val::F64(tmp.v.f64 as u64), [INFO] [stdout] | ^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn extism_plugin_config( [INFO] [stdout] 400 | | ctx: *mut Context, [INFO] [stdout] 401 | | plugin: PluginIndex, [INFO] [stdout] 402 | | json: *const u8, [INFO] [stdout] 403 | | json_size: Size, [INFO] [stdout] 404 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:417:16 [INFO] [stdout] | [INFO] [stdout] 417 | let data = std::slice::from_raw_parts(json, json_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:237:21 [INFO] [stdout] | [INFO] [stdout] 237 | let namespace = std::ffi::CStr::from_ptr(namespace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:233:1 [INFO] [stdout] | [INFO] [stdout] 233 | / pub unsafe extern "C" fn extism_function_set_namespace( [INFO] [stdout] 234 | | ptr: *mut ExtismFunction, [INFO] [stdout] 235 | | namespace: *const std::ffi::c_char, [INFO] [stdout] 236 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:238:18 [INFO] [stdout] | [INFO] [stdout] 238 | let f = &mut *ptr; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:245:10 [INFO] [stdout] | [INFO] [stdout] 245 | drop(Box::from_raw(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:244:1 [INFO] [stdout] | [INFO] [stdout] 244 | pub unsafe extern "C" fn extism_function_free(ptr: *mut ExtismFunction) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:464:20 [INFO] [stdout] | [INFO] [stdout] 464 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:459:1 [INFO] [stdout] | [INFO] [stdout] 459 | / pub unsafe extern "C" fn extism_plugin_function_exists( [INFO] [stdout] 460 | | ctx: *mut Context, [INFO] [stdout] 461 | | plugin: PluginIndex, [INFO] [stdout] 462 | | func_name: *const c_char, [INFO] [stdout] 463 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:470:16 [INFO] [stdout] | [INFO] [stdout] 470 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:265:20 [INFO] [stdout] | [INFO] [stdout] 265 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:256:1 [INFO] [stdout] | [INFO] [stdout] 256 | / pub unsafe extern "C" fn extism_plugin_new( [INFO] [stdout] 257 | | ctx: *mut Context, [INFO] [stdout] 258 | | wasm: *const u8, [INFO] [stdout] 259 | | wasm_size: Size, [INFO] [stdout] ... | [INFO] [stdout] 262 | | with_wasi: bool, [INFO] [stdout] 263 | | ) -> PluginIndex { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:266:16 [INFO] [stdout] | [INFO] [stdout] 266 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:496:20 [INFO] [stdout] | [INFO] [stdout] 496 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:489:1 [INFO] [stdout] | [INFO] [stdout] 489 | / pub unsafe extern "C" fn extism_plugin_call( [INFO] [stdout] 490 | | ctx: *mut Context, [INFO] [stdout] 491 | | plugin_id: PluginIndex, [INFO] [stdout] 492 | | func_name: *const c_char, [INFO] [stdout] 493 | | data: *const u8, [INFO] [stdout] 494 | | data_len: Size, [INFO] [stdout] 495 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:499:16 [INFO] [stdout] | [INFO] [stdout] 499 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:301:20 [INFO] [stdout] | [INFO] [stdout] 301 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:291:1 [INFO] [stdout] | [INFO] [stdout] 291 | / pub unsafe extern "C" fn extism_plugin_update( [INFO] [stdout] 292 | | ctx: *mut Context, [INFO] [stdout] 293 | | index: PluginIndex, [INFO] [stdout] 294 | | wasm: *const u8, [INFO] [stdout] ... | [INFO] [stdout] 298 | | with_wasi: bool, [INFO] [stdout] 299 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:303:16 [INFO] [stdout] | [INFO] [stdout] 303 | let data = std::slice::from_raw_parts(wasm, wasm_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:349:20 [INFO] [stdout] | [INFO] [stdout] 349 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:342:1 [INFO] [stdout] | [INFO] [stdout] 342 | pub unsafe extern "C" fn extism_plugin_free(ctx: *mut Context, plugin: PluginIndex) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:595:20 [INFO] [stdout] | [INFO] [stdout] 595 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:592:1 [INFO] [stdout] | [INFO] [stdout] 592 | pub unsafe extern "C" fn extism_error(ctx: *mut Context, plugin: PluginIndex) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:364:20 [INFO] [stdout] | [INFO] [stdout] 364 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:360:1 [INFO] [stdout] | [INFO] [stdout] 360 | / pub unsafe extern "C" fn extism_plugin_cancel_handle( [INFO] [stdout] 361 | | ctx: *mut Context, [INFO] [stdout] 362 | | plugin: PluginIndex, [INFO] [stdout] 363 | | ) -> *const ExtismCancelHandle { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:621:5 [INFO] [stdout] | [INFO] [stdout] 621 | plugin.memory_ptr().add(output[0].unwrap_i64() as usize) as *const _ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:376:19 [INFO] [stdout] | [INFO] [stdout] 376 | let handle = &*handle; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:375:1 [INFO] [stdout] | [INFO] [stdout] 375 | pub unsafe extern "C" fn extism_plugin_cancel(handle: *const ExtismCancelHandle) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:387:20 [INFO] [stdout] | [INFO] [stdout] 387 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:386:1 [INFO] [stdout] | [INFO] [stdout] 386 | pub unsafe extern "C" fn extism_context_reset(ctx: *mut Context) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:632:20 [INFO] [stdout] | [INFO] [stdout] 632 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:626:1 [INFO] [stdout] | [INFO] [stdout] 626 | / pub unsafe extern "C" fn extism_plugin_output_length( [INFO] [stdout] 627 | | ctx: *mut Context, [INFO] [stdout] 628 | | plugin: PluginIndex, [INFO] [stdout] 629 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn extism_plugin_config( [INFO] [stdout] 400 | | ctx: *mut Context, [INFO] [stdout] 401 | | plugin: PluginIndex, [INFO] [stdout] 402 | | json: *const u8, [INFO] [stdout] 403 | | json_size: Size, [INFO] [stdout] 404 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:417:16 [INFO] [stdout] | [INFO] [stdout] 417 | let data = std::slice::from_raw_parts(json, json_size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:659:20 [INFO] [stdout] | [INFO] [stdout] 659 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:653:1 [INFO] [stdout] | [INFO] [stdout] 653 | / pub unsafe extern "C" fn extism_plugin_output_data( [INFO] [stdout] 654 | | ctx: *mut Context, [INFO] [stdout] 655 | | plugin: PluginIndex, [INFO] [stdout] 656 | | ) -> *const u8 { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:667:26 [INFO] [stdout] | [INFO] [stdout] 667 | let mut store = &mut *(plugin.store_mut() as *mut Store<_>); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:679:5 [INFO] [stdout] | [INFO] [stdout] 679 | ptr.add(offs) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:695:20 [INFO] [stdout] | [INFO] [stdout] 695 | let file = std::ffi::CStr::from_ptr(filename); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:684:1 [INFO] [stdout] | [INFO] [stdout] 684 | / pub unsafe extern "C" fn extism_log_file( [INFO] [stdout] 685 | | filename: *const c_char, [INFO] [stdout] 686 | | log_level: *const c_char, [INFO] [stdout] 687 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:707:21 [INFO] [stdout] | [INFO] [stdout] 707 | let level = std::ffi::CStr::from_ptr(log_level); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:464:20 [INFO] [stdout] | [INFO] [stdout] 464 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:459:1 [INFO] [stdout] | [INFO] [stdout] 459 | / pub unsafe extern "C" fn extism_plugin_function_exists( [INFO] [stdout] 460 | | ctx: *mut Context, [INFO] [stdout] 461 | | plugin: PluginIndex, [INFO] [stdout] 462 | | func_name: *const c_char, [INFO] [stdout] 463 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:470:16 [INFO] [stdout] | [INFO] [stdout] 470 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:496:20 [INFO] [stdout] | [INFO] [stdout] 496 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:489:1 [INFO] [stdout] | [INFO] [stdout] 489 | / pub unsafe extern "C" fn extism_plugin_call( [INFO] [stdout] 490 | | ctx: *mut Context, [INFO] [stdout] 491 | | plugin_id: PluginIndex, [INFO] [stdout] 492 | | func_name: *const c_char, [INFO] [stdout] 493 | | data: *const u8, [INFO] [stdout] 494 | | data_len: Size, [INFO] [stdout] 495 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:499:16 [INFO] [stdout] | [INFO] [stdout] 499 | let name = std::ffi::CStr::from_ptr(func_name); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:595:20 [INFO] [stdout] | [INFO] [stdout] 595 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:592:1 [INFO] [stdout] | [INFO] [stdout] 592 | pub unsafe extern "C" fn extism_error(ctx: *mut Context, plugin: PluginIndex) -> *const c_char { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:621:5 [INFO] [stdout] | [INFO] [stdout] 621 | plugin.memory_ptr().add(output[0].unwrap_i64() as usize) as *const _ [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:632:20 [INFO] [stdout] | [INFO] [stdout] 632 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:626:1 [INFO] [stdout] | [INFO] [stdout] 626 | / pub unsafe extern "C" fn extism_plugin_output_length( [INFO] [stdout] 627 | | ctx: *mut Context, [INFO] [stdout] 628 | | plugin: PluginIndex, [INFO] [stdout] 629 | | ) -> Size { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:659:20 [INFO] [stdout] | [INFO] [stdout] 659 | let ctx = &mut *ctx; [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:653:1 [INFO] [stdout] | [INFO] [stdout] 653 | / pub unsafe extern "C" fn extism_plugin_output_data( [INFO] [stdout] 654 | | ctx: *mut Context, [INFO] [stdout] 655 | | plugin: PluginIndex, [INFO] [stdout] 656 | | ) -> *const u8 { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:667:26 [INFO] [stdout] | [INFO] [stdout] 667 | let mut store = &mut *(plugin.store_mut() as *mut Store<_>); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:679:5 [INFO] [stdout] | [INFO] [stdout] 679 | ptr.add(offs) [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:695:20 [INFO] [stdout] | [INFO] [stdout] 695 | let file = std::ffi::CStr::from_ptr(filename); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sdk.rs:684:1 [INFO] [stdout] | [INFO] [stdout] 684 | / pub unsafe extern "C" fn extism_log_file( [INFO] [stdout] 685 | | filename: *const c_char, [INFO] [stdout] 686 | | log_level: *const c_char, [INFO] [stdout] 687 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/sdk.rs:707:21 [INFO] [stdout] | [INFO] [stdout] 707 | let level = std::ffi::CStr::from_ptr(log_level); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 23 previous errors; 37 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `extism-runtime` (lib test) due to 24 previous errors; 37 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error: aborting due to 23 previous errors; 37 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `extism-runtime` (lib) due to 24 previous errors; 37 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "7b9f5dc902de78739146a7a3c1704d1412b01b89f2097889b817e9c13cd95c50", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "7b9f5dc902de78739146a7a3c1704d1412b01b89f2097889b817e9c13cd95c50", kill_on_drop: false }` [INFO] [stdout] 7b9f5dc902de78739146a7a3c1704d1412b01b89f2097889b817e9c13cd95c50