[INFO] fetching crate glib 0.20.3... [INFO] checking glib-0.20.3 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate glib 0.20.3 into /workspace/builds/worker-5-tc2/source [INFO] validating manifest of crates.io crate glib 0.20.3 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate glib 0.20.3 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate glib 0.20.3 [INFO] tweaked toml for crates.io crate glib 0.20.3 written to /workspace/builds/worker-5-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 109 packages to latest compatible versions [INFO] [stderr] Adding anes v0.1.6 (available: v0.2.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 0a89cb292225f70113c2b2bed1fd3511dfc2a372cc2e6242175c4fb0c602b6b9 [INFO] running `Command { std: "docker" "start" "-a" "0a89cb292225f70113c2b2bed1fd3511dfc2a372cc2e6242175c4fb0c602b6b9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "0a89cb292225f70113c2b2bed1fd3511dfc2a372cc2e6242175c4fb0c602b6b9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0a89cb292225f70113c2b2bed1fd3511dfc2a372cc2e6242175c4fb0c602b6b9", kill_on_drop: false }` [INFO] [stdout] 0a89cb292225f70113c2b2bed1fd3511dfc2a372cc2e6242175c4fb0c602b6b9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] bca9f20e5f6acbd68b62f01937f549c66d84701f78471fb89d69ab90777b2332 [INFO] running `Command { std: "docker" "start" "-a" "bca9f20e5f6acbd68b62f01937f549c66d84701f78471fb89d69ab90777b2332", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (2 fixes) [INFO] [stderr] Compiling serde v1.0.210 [INFO] [stderr] Compiling winnow v0.6.20 [INFO] [stderr] Compiling target-lexicon v0.12.16 [INFO] [stderr] Compiling smallvec v1.13.2 [INFO] [stderr] Compiling version-compare v0.2.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking futures-core v0.3.30 [INFO] [stderr] Checking half v2.4.1 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking plotters-backend v0.3.7 [INFO] [stderr] Compiling futures-macro v0.3.30 [INFO] [stderr] Checking clap_lex v0.7.2 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Compiling trybuild2 v1.2.0 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Checking clap_builder v4.5.18 [INFO] [stderr] Checking plotters-svg v0.3.7 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking is-terminal v0.4.13 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking oorandom v11.1.4 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking termcolor v1.4.1 [INFO] [stderr] Checking gir-format-check v0.1.3 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Compiling cfg-expr v0.17.0 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking criterion-plot v0.5.0 [INFO] [stderr] Checking clap v4.5.18 [INFO] [stderr] Checking serde_json v1.0.128 [INFO] [stderr] Checking ciborium v0.2.2 [INFO] [stderr] Checking basic-toml v0.1.9 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Compiling serde_spanned v0.6.8 [INFO] [stderr] Compiling toml_datetime v0.6.8 [INFO] [stderr] Compiling toml_edit v0.22.22 [INFO] [stderr] Checking tinytemplate v1.2.1 [INFO] [stderr] Checking criterion v0.5.1 [INFO] [stderr] Compiling toml v0.8.19 [INFO] [stderr] Compiling proc-macro-crate v3.2.0 [INFO] [stderr] Compiling system-deps v7.0.3 [INFO] [stderr] Compiling glib-macros v0.20.4 [INFO] [stderr] Compiling glib-sys v0.20.4 [INFO] [stderr] Compiling gobject-sys v0.20.4 [INFO] [stderr] Compiling gio-sys v0.20.4 [INFO] [stderr] Checking glib v0.20.3 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `glib` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/boxed.rs [INFO] [stderr] * src/boxed_inline.rs [INFO] [stderr] * src/error.rs [INFO] [stderr] * src/gstring_builder.rs [INFO] [stderr] * src/log.rs [INFO] [stderr] * src/object.rs [INFO] [stderr] * src/param_spec.rs [INFO] [stderr] * src/shared.rs [INFO] [stderr] * src/subclass/type_module.rs [INFO] [stderr] * src/translate.rs [INFO] [stderr] * src/value.rs [INFO] [stderr] * src/variant.rs [INFO] [stderr] * src/wrapper.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:284:39 [INFO] [stderr] | [INFO] [stderr] 284 | copy => |$copy_arg:ident| $copy_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:285:39 [INFO] [stderr] | [INFO] [stderr] 285 | free => |$free_arg:ident| $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:287:25 [INFO] [stderr] | [INFO] [stderr] 287 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:305:39 [INFO] [stderr] | [INFO] [stderr] 305 | copy => |$copy_arg:ident| $copy_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:306:39 [INFO] [stderr] | [INFO] [stderr] 306 | free => |$free_arg:ident| $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:309:39 [INFO] [stderr] | [INFO] [stderr] 309 | init => |$init_arg:ident| $init_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:310:80 [INFO] [stderr] | [INFO] [stderr] 310 | copy_into => |$copy_into_arg_dest:ident, $copy_into_arg_src:ident| $copy_into_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:311:41 [INFO] [stderr] | [INFO] [stderr] 311 | clear => |$clear_arg:ident| $clear_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:314:25 [INFO] [stderr] | [INFO] [stderr] 314 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:342:37 [INFO] [stderr] | [INFO] [stderr] 342 | ref => |$ref_arg:ident| $ref_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:343:41 [INFO] [stderr] | [INFO] [stderr] 343 | unref => |$unref_arg:ident| $unref_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:345:25 [INFO] [stderr] | [INFO] [stderr] 345 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:362:25 [INFO] [stderr] | [INFO] [stderr] 362 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:380:25 [INFO] [stderr] | [INFO] [stderr] 380 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/wrapper.rs:422:25 [INFO] [stderr] | [INFO] [stderr] 422 | type_ => || $get_type_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:21:28 [INFO] [stderr] | [INFO] [stderr] 21 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:21:72 [INFO] [stderr] | [INFO] [stderr] 21 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:22:17 [INFO] [stderr] | [INFO] [stderr] 22 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:329:111 [INFO] [stderr] | [INFO] [stderr] 329 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:432:135 [INFO] [stderr] | [INFO] [stderr] 432 | ...bound2:tt)*)?),+>)?, $ffi_name:ty, @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed.rs:432:179 [INFO] [stderr] | [INFO] [stderr] 432 | ...py_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:11:17 [INFO] [stderr] | [INFO] [stderr] 11 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:45:28 [INFO] [stderr] | [INFO] [stderr] 45 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:45:72 [INFO] [stderr] | [INFO] [stderr] 45 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:46:17 [INFO] [stderr] | [INFO] [stderr] 46 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:80:28 [INFO] [stderr] | [INFO] [stderr] 80 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021,... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:80:112 [INFO] [stderr] | [INFO] [stderr] 80 | ...to $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:80:163 [INFO] [stderr] | [INFO] [stderr] 80 | ...dent $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:81:17 [INFO] [stderr] | [INFO] [stderr] 81 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:122:28 [INFO] [stderr] | [INFO] [stderr] 122 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:122:72 [INFO] [stderr] | [INFO] [stderr] 122 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:123:28 [INFO] [stderr] | [INFO] [stderr] 123 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021,... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:123:112 [INFO] [stderr] | [INFO] [stderr] 123 | ...to $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:123:163 [INFO] [stderr] | [INFO] [stderr] 123 | ...dent $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:124:17 [INFO] [stderr] | [INFO] [stderr] 124 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:163:28 [INFO] [stderr] | [INFO] [stderr] 163 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:163:72 [INFO] [stderr] | [INFO] [stderr] 163 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:164:28 [INFO] [stderr] | [INFO] [stderr] 164 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021,... [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:164:112 [INFO] [stderr] | [INFO] [stderr] 164 | ...to $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:164:163 [INFO] [stderr] | [INFO] [stderr] 164 | ...dent $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/boxed_inline.rs:558:111 [INFO] [stderr] | [INFO] [stderr] 558 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:20:26 [INFO] [stderr] | [INFO] [stderr] 20 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:20:71 [INFO] [stderr] | [INFO] [stderr] 20 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr_2021 [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:21:17 [INFO] [stderr] | [INFO] [stderr] 21 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:31:26 [INFO] [stderr] | [INFO] [stderr] 31 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:31:71 [INFO] [stderr] | [INFO] [stderr] 31 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/shared.rs:344:111 [INFO] [stderr] | [INFO] [stderr] 344 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/error.rs:180:6 [INFO] [stderr] | [INFO] [stderr] 180 | ($ffi_bool:expr_2021, $($msg:tt)*) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:620:198 [INFO] [stderr] | [INFO] [stderr] 620 | ...rent_type:ty, $ffi_name:ty, $ffi_class_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1221:203 [INFO] [stderr] | [INFO] [stderr] 1221 | ...y, $ffi_name:ty, @ffi_class $ffi_class_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1231:13 [INFO] [stderr] | [INFO] [stderr] 1231 | @type_ $get_type_expr:expr_2021, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1239:13 [INFO] [stderr] | [INFO] [stderr] 1239 | @type_ $get_type_expr:expr_2021, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1315:13 [INFO] [stderr] | [INFO] [stderr] 1315 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1323:12 [INFO] [stderr] | [INFO] [stderr] 1323 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/object.rs:1332:13 [INFO] [stderr] | [INFO] [stderr] 1332 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/value.rs:1253:16 [INFO] [stderr] | [INFO] [stderr] 1253 | ($name:ty, $get:expr_2021, $set:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/value.rs:1253:32 [INFO] [stderr] | [INFO] [stderr] 1253 | ($name:ty, $get:expr_2021, $set:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/variant.rs:1021:16 [INFO] [stderr] | [INFO] [stderr] 1021 | ($name:ty, $typ:expr_2021, $new_fn:ident, $get_fn:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/variant.rs:1745:8 [INFO] [stderr] | [INFO] [stderr] 1745 | ($($len:expr_2021 => ($($n:tt $name:ident)+))+) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/param_spec.rs:305:40 [INFO] [stderr] | [INFO] [stderr] 305 | ($rust_type:ident, $ffi_type:path, $rust_type_offset:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/param_spec.rs:520:56 [INFO] [stderr] | [INFO] [stderr] 520 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $from_glib:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/param_spec.rs:560:56 [INFO] [stderr] | [INFO] [stderr] 560 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $rust_type_offset:expr_2021, $ffi_fun:ident) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/param_spec.rs:712:49 [INFO] [stderr] | [INFO] [stderr] 712 | $($field_id:ident: $field_ty:ty $(= $field_expr:expr_2021)?,)* [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:470:6 [INFO] [stderr] | [INFO] [stderr] 470 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:470:29 [INFO] [stderr] | [INFO] [stderr] 470 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:470:70 [INFO] [stderr] | [INFO] [stderr] 470 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:533:6 [INFO] [stderr] | [INFO] [stderr] 533 | ($log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:533:47 [INFO] [stderr] | [INFO] [stderr] 533 | ($log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:536:6 [INFO] [stderr] | [INFO] [stderr] 536 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:536:29 [INFO] [stderr] | [INFO] [stderr] 536 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:536:70 [INFO] [stderr] | [INFO] [stderr] 536 | ($log_domain:expr_2021, $log_level:expr_2021, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:571:6 [INFO] [stderr] | [INFO] [stderr] 571 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:571:48 [INFO] [stderr] | [INFO] [stderr] 571 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:574:6 [INFO] [stderr] | [INFO] [stderr] 574 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:608:6 [INFO] [stderr] | [INFO] [stderr] 608 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:608:48 [INFO] [stderr] | [INFO] [stderr] 608 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:611:6 [INFO] [stderr] | [INFO] [stderr] 611 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:645:6 [INFO] [stderr] | [INFO] [stderr] 645 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:645:48 [INFO] [stderr] | [INFO] [stderr] 645 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:648:6 [INFO] [stderr] | [INFO] [stderr] 648 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:682:6 [INFO] [stderr] | [INFO] [stderr] 682 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:682:48 [INFO] [stderr] | [INFO] [stderr] 682 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:685:6 [INFO] [stderr] | [INFO] [stderr] 685 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:719:6 [INFO] [stderr] | [INFO] [stderr] 719 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:719:48 [INFO] [stderr] | [INFO] [stderr] 719 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:722:6 [INFO] [stderr] | [INFO] [stderr] 722 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:756:6 [INFO] [stderr] | [INFO] [stderr] 756 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:756:48 [INFO] [stderr] | [INFO] [stderr] 756 | ($log_domain:expr_2021, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:759:6 [INFO] [stderr] | [INFO] [stderr] 759 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:767:19 [INFO] [stderr] | [INFO] [stderr] 767 | ($func:ident, $format:expr_2021 $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:767:41 [INFO] [stderr] | [INFO] [stderr] 767 | ($func:ident, $format:expr_2021 $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:806:6 [INFO] [stderr] | [INFO] [stderr] 806 | ($format:expr_2021 $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:806:27 [INFO] [stderr] | [INFO] [stderr] 806 | ($format:expr_2021 $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:833:6 [INFO] [stderr] | [INFO] [stderr] 833 | ($format:expr_2021 $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:833:28 [INFO] [stderr] | [INFO] [stderr] 833 | ($format:expr_2021 $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:876:6 [INFO] [stderr] | [INFO] [stderr] 876 | ($log_domain:expr_2021, $log_level:expr_2021, {$($key:expr_2021 => $format:expr_2021 $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:876:29 [INFO] [stderr] | [INFO] [stderr] 876 | ($log_domain:expr_2021, $log_level:expr_2021, {$($key:expr_2021 => $format:expr_2021 $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:876:54 [INFO] [stderr] | [INFO] [stderr] 876 | ($log_domain:expr_2021, $log_level:expr_2021, {$($key:expr_2021 => $format:expr_2021 $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:876:72 [INFO] [stderr] | [INFO] [stderr] 876 | ($log_domain:expr_2021, $log_level:expr_2021, {$($key:expr_2021 => $format:expr_2021 $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:876:93 [INFO] [stderr] | [INFO] [stderr] 876 | ($log_domain:expr_2021, $log_level:expr_2021, {$($key:expr_2021 => $format:expr_2021 $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:934:11 [INFO] [stderr] | [INFO] [stderr] 934 | (@key $key:expr_2021) => { std::convert::AsRef::<$crate::GStr>::as_ref(&$key) }; [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:935:13 [INFO] [stderr] | [INFO] [stderr] 935 | (@value $value:expr_2021) => { std::convert::AsRef::<[u8]>::as_ref(&$value) }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:936:13 [INFO] [stderr] | [INFO] [stderr] 936 | (@value $format:expr_2021 $(,$arg:expr_2021)+) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/log.rs:936:34 [INFO] [stderr] | [INFO] [stderr] 936 | (@value $format:expr_2021 $(,$arg:expr_2021)+) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/translate.rs:471:50 [INFO] [stderr] | [INFO] [stderr] 463 | pub trait ToGlibPtrMut<'a, P: Copy> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 471 | fn to_glib_none_mut(&'a mut self) -> StashMut; [INFO] [stderr] | ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/value.rs:574:53 [INFO] [stderr] | [INFO] [stderr] 574 | pub fn get<'a, T>(&'a self) -> Result::Checker as ValueTypeChecker>::Error> [INFO] [stderr] | -- lifetime `'a` declared here ^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/gstring_builder.rs:17:23 [INFO] [stderr] | [INFO] [stderr] 17 | init => |ptr| unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] ::: src/boxed_inline.rs:200:49 [INFO] [stderr] | [INFO] [stderr] 200 | unsafe fn uninitialized() -> Self { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/subclass/type_module.rs:85:9 [INFO] [stderr] | [INFO] [stderr] 73 | ) -> ffi::gboolean { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 85 | unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 104 previous errors; 4 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:284:50 [INFO] [stdout] | [INFO] [stdout] 284 | copy => |$copy_arg:ident| $copy_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 284 | copy => |$copy_arg:ident| $copy_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:285:50 [INFO] [stdout] | [INFO] [stdout] 285 | free => |$free_arg:ident| $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 285 | free => |$free_arg:ident| $free_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:287:40 [INFO] [stdout] | [INFO] [stdout] 287 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 287 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:305:50 [INFO] [stdout] | [INFO] [stdout] 305 | copy => |$copy_arg:ident| $copy_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 305 | copy => |$copy_arg:ident| $copy_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:306:50 [INFO] [stdout] | [INFO] [stdout] 306 | free => |$free_arg:ident| $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 306 | free => |$free_arg:ident| $free_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:309:50 [INFO] [stdout] | [INFO] [stdout] 309 | init => |$init_arg:ident| $init_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 309 | init => |$init_arg:ident| $init_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:310:96 [INFO] [stdout] | [INFO] [stdout] 310 | copy_into => |$copy_into_arg_dest:ident, $copy_into_arg_src:ident| $copy_into_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 310 | copy_into => |$copy_into_arg_dest:ident, $copy_into_arg_src:ident| $copy_into_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:311:53 [INFO] [stdout] | [INFO] [stdout] 311 | clear => |$clear_arg:ident| $clear_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 311 | clear => |$clear_arg:ident| $clear_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:314:40 [INFO] [stdout] | [INFO] [stdout] 314 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 314 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:342:47 [INFO] [stdout] | [INFO] [stdout] 342 | ref => |$ref_arg:ident| $ref_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 342 | ref => |$ref_arg:ident| $ref_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:343:53 [INFO] [stdout] | [INFO] [stdout] 343 | unref => |$unref_arg:ident| $unref_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 343 | unref => |$unref_arg:ident| $unref_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:345:40 [INFO] [stdout] | [INFO] [stdout] 345 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 345 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:362:40 [INFO] [stdout] | [INFO] [stdout] 362 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 362 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:380:40 [INFO] [stdout] | [INFO] [stdout] 380 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 380 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/wrapper.rs:422:40 [INFO] [stdout] | [INFO] [stdout] 422 | type_ => || $get_type_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 422 | type_ => || $get_type_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:21:39 [INFO] [stdout] | [INFO] [stdout] 21 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 21 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:21:78 [INFO] [stdout] | [INFO] [stdout] 21 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 21 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:22:32 [INFO] [stdout] | [INFO] [stdout] 22 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 22 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:329:126 [INFO] [stdout] | [INFO] [stdout] 329 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 329 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:432:146 [INFO] [stdout] | [INFO] [stdout] 432 | ...nd2:tt)*)?),+>)?, $ffi_name:ty, @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 432 | (@memory_manager_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed.rs:432:185 [INFO] [stdout] | [INFO] [stdout] 432 | ...copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 432 | (@memory_manager_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:11:32 [INFO] [stdout] | [INFO] [stdout] 11 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 11 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:45:39 [INFO] [stdout] | [INFO] [stdout] 45 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 45 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:45:78 [INFO] [stdout] | [INFO] [stdout] 45 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 45 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr_2021 [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:46:32 [INFO] [stdout] | [INFO] [stdout] 46 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 46 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:80:39 [INFO] [stdout] | [INFO] [stdout] 80 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 80 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:80:123 [INFO] [stdout] | [INFO] [stdout] 80 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 80 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:80:165 [INFO] [stdout] | [INFO] [stdout] 80 | ...:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 80 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:81:32 [INFO] [stdout] | [INFO] [stdout] 81 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 81 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:122:39 [INFO] [stdout] | [INFO] [stdout] 122 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 122 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:122:78 [INFO] [stdout] | [INFO] [stdout] 122 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 122 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:123:39 [INFO] [stdout] | [INFO] [stdout] 123 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 123 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:123:123 [INFO] [stdout] | [INFO] [stdout] 123 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 123 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:123:165 [INFO] [stdout] | [INFO] [stdout] 123 | ...:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 123 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr_2021 [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:124:32 [INFO] [stdout] | [INFO] [stdout] 124 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 124 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:163:39 [INFO] [stdout] | [INFO] [stdout] 163 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 163 | @copy $copy_arg:ident $copy_expr:expr_2021, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:163:78 [INFO] [stdout] | [INFO] [stdout] 163 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 163 | @copy $copy_arg:ident $copy_expr:expr, @free $free_arg:ident $free_expr:expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:164:39 [INFO] [stdout] | [INFO] [stdout] 164 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 164 | @init $init_arg:ident $init_expr:expr_2021, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:164:123 [INFO] [stdout] | [INFO] [stdout] 164 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $c... [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 164 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr_2021, @clear $clear_arg:ident $clear_expr:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:164:165 [INFO] [stdout] | [INFO] [stdout] 164 | ...:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 164 | @init $init_arg:ident $init_expr:expr, @copy_into $copy_into_arg_dest:ident $copy_into_arg_src:ident $copy_into_expr:expr, @clear $clear_arg:ident $clear_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/boxed_inline.rs:558:126 [INFO] [stdout] | [INFO] [stdout] 558 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 558 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:20:36 [INFO] [stdout] | [INFO] [stdout] 20 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 20 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:20:78 [INFO] [stdout] | [INFO] [stdout] 20 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 20 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr_2021 [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:21:32 [INFO] [stdout] | [INFO] [stdout] 21 | $(, @type_ $get_type_expr:expr)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 21 | $(, @type_ $get_type_expr:expr_2021)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:31:36 [INFO] [stdout] | [INFO] [stdout] 31 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 31 | @ref $ref_arg:ident $ref_expr:expr_2021, @unref $unref_arg:ident $unref_expr:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:31:78 [INFO] [stdout] | [INFO] [stdout] 31 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 31 | @ref $ref_arg:ident $ref_expr:expr, @unref $unref_arg:ident $unref_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/shared.rs:344:126 [INFO] [stdout] | [INFO] [stdout] 344 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 344 | (@value_impl $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $ffi_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/error.rs:180:16 [INFO] [stdout] | [INFO] [stdout] 180 | ($ffi_bool:expr, $($msg:tt)*) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 180 | ($ffi_bool:expr_2021, $($msg:tt)*) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:620:213 [INFO] [stdout] | [INFO] [stdout] 620 | ...type:ty, $ffi_name:ty, $ffi_class_name:ty, @type_ $get_type_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 620 | (@generic_impl [$($attr:meta)*] $visibility:vis $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $impl_type:ty, $parent_type:ty, $ffi_name:ty, $ffi_class_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1221:218 [INFO] [stdout] | [INFO] [stdout] 1221 | ...fi_name:ty, @ffi_class $ffi_class_name:ty, @type_ $get_type_expr:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1221 | (@object [$($attr:meta)*] $visibility:vis $name:ident $(<$($generic:ident $(: $bound:tt $(+ $bound2:tt)*)?),+>)?, $impl_type:ty, $parent_type:ty, $ffi_name:ty, @ffi_class $ffi_class_name:ty, @type_ $get_type_expr:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1231:28 [INFO] [stdout] | [INFO] [stdout] 1231 | @type_ $get_type_expr:expr, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1231 | @type_ $get_type_expr:expr_2021, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1239:28 [INFO] [stdout] | [INFO] [stdout] 1239 | @type_ $get_type_expr:expr, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1239 | @type_ $get_type_expr:expr_2021, @extends [$($extends:tt)*], @implements [$($implements:tt)*]) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1315:28 [INFO] [stdout] | [INFO] [stdout] 1315 | @type_ $get_type_expr:expr, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1315 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1323:27 [INFO] [stdout] | [INFO] [stdout] 1323 | @type_ $get_type_expr:expr, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1323 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/object.rs:1332:28 [INFO] [stdout] | [INFO] [stdout] 1332 | @type_ $get_type_expr:expr, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1332 | @type_ $get_type_expr:expr_2021, @requires [$($requires:tt)*]) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/translate.rs:471:50 [INFO] [stdout] | [INFO] [stdout] 463 | pub trait ToGlibPtrMut<'a, P: Copy> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 471 | fn to_glib_none_mut(&'a mut self) -> StashMut; [INFO] [stdout] | ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/value.rs:574:53 [INFO] [stdout] | [INFO] [stdout] 574 | pub fn get<'a, T>(&'a self) -> Result::Checker as ValueTypeChecker>::Error> [INFO] [stdout] | -- lifetime `'a` declared here ^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/value.rs:1253:21 [INFO] [stdout] | [INFO] [stdout] 1253 | ($name:ty, $get:expr, $set:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1253 | ($name:ty, $get:expr_2021, $set:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/value.rs:1253:32 [INFO] [stdout] | [INFO] [stdout] 1253 | ($name:ty, $get:expr, $set:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1253 | ($name:ty, $get:expr, $set:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/variant.rs:1021:21 [INFO] [stdout] | [INFO] [stdout] 1021 | ($name:ty, $typ:expr, $new_fn:ident, $get_fn:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1021 | ($name:ty, $typ:expr_2021, $new_fn:ident, $get_fn:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/variant.rs:1745:13 [INFO] [stdout] | [INFO] [stdout] 1745 | ($($len:expr => ($($n:tt $name:ident)+))+) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 1745 | ($($len:expr_2021 => ($($n:tt $name:ident)+))+) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/param_spec.rs:300:1 [INFO] [stdout] | [INFO] [stdout] 300 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 301 | | pub static g_param_spec_types: *const ffi::GType; [INFO] [stdout] 302 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/param_spec.rs:305:58 [INFO] [stdout] | [INFO] [stdout] 305 | ($rust_type:ident, $ffi_type:path, $rust_type_offset:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 305 | ($rust_type:ident, $ffi_type:path, $rust_type_offset:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/param_spec.rs:520:67 [INFO] [stdout] | [INFO] [stdout] 520 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $from_glib:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 520 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $from_glib:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/param_spec.rs:560:74 [INFO] [stdout] | [INFO] [stdout] 560 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $rust_type_offset:expr, $ffi_fun:ident) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 560 | ($rust_type:ident, $ffi_type:path, $value_type:ty, $rust_type_offset:expr_2021, $ffi_fun:ident) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/param_spec.rs:712:61 [INFO] [stdout] | [INFO] [stdout] 712 | $($field_id:ident: $field_ty:ty $(= $field_expr:expr)?,)* [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 712 | $($field_id:ident: $field_ty:ty $(= $field_expr:expr_2021)?,)* [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:470:18 [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr_2021, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:470:35 [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr, $log_level:expr_2021, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:470:65 [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 470 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:533:17 [INFO] [stdout] | [INFO] [stdout] 533 | ($log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 533 | ($log_level:expr_2021, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:533:47 [INFO] [stdout] | [INFO] [stdout] 533 | ($log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 533 | ($log_level:expr, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:536:18 [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr_2021, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:536:35 [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr, $log_level:expr_2021, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:536:65 [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 536 | ($log_domain:expr, $log_level:expr, $format:literal $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:571:18 [INFO] [stdout] | [INFO] [stdout] 571 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 571 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:571:48 [INFO] [stdout] | [INFO] [stdout] 571 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 571 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:574:18 [INFO] [stdout] | [INFO] [stdout] 574 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 574 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:608:18 [INFO] [stdout] | [INFO] [stdout] 608 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 608 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:608:48 [INFO] [stdout] | [INFO] [stdout] 608 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 608 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:611:18 [INFO] [stdout] | [INFO] [stdout] 611 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 611 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:645:18 [INFO] [stdout] | [INFO] [stdout] 645 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 645 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:645:48 [INFO] [stdout] | [INFO] [stdout] 645 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 645 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:648:18 [INFO] [stdout] | [INFO] [stdout] 648 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 648 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:682:18 [INFO] [stdout] | [INFO] [stdout] 682 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 682 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:682:48 [INFO] [stdout] | [INFO] [stdout] 682 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 682 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:685:18 [INFO] [stdout] | [INFO] [stdout] 685 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 685 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:719:18 [INFO] [stdout] | [INFO] [stdout] 719 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 719 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:719:48 [INFO] [stdout] | [INFO] [stdout] 719 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 719 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:722:18 [INFO] [stdout] | [INFO] [stdout] 722 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 722 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:756:18 [INFO] [stdout] | [INFO] [stdout] 756 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 756 | ($log_domain:expr_2021, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:756:48 [INFO] [stdout] | [INFO] [stdout] 756 | ($log_domain:expr, $format:literal, $($arg:expr),* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 756 | ($log_domain:expr, $format:literal, $($arg:expr_2021),* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:759:18 [INFO] [stdout] | [INFO] [stdout] 759 | ($log_domain:expr, $format:literal $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 759 | ($log_domain:expr_2021, $format:literal $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:767:27 [INFO] [stdout] | [INFO] [stdout] 767 | ($func:ident, $format:expr $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 767 | ($func:ident, $format:expr_2021 $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:767:41 [INFO] [stdout] | [INFO] [stdout] 767 | ($func:ident, $format:expr $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 767 | ($func:ident, $format:expr $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:806:14 [INFO] [stdout] | [INFO] [stdout] 806 | ($format:expr $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 806 | ($format:expr_2021 $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:806:27 [INFO] [stdout] | [INFO] [stdout] 806 | ($format:expr $(,$arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 806 | ($format:expr $(,$arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:833:14 [INFO] [stdout] | [INFO] [stdout] 833 | ($format:expr $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 833 | ($format:expr_2021 $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:833:28 [INFO] [stdout] | [INFO] [stdout] 833 | ($format:expr $(, $arg:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 833 | ($format:expr $(, $arg:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:876:18 [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr_2021, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:876:35 [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr_2021, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:876:49 [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr_2021 => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:876:65 [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr_2021 $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:876:78 [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 876 | ($log_domain:expr, $log_level:expr, {$($key:expr => $format:expr $(,$arg:expr_2021)* $(,)?);+ $(;)?} $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:934:16 [INFO] [stdout] | [INFO] [stdout] 934 | (@key $key:expr) => { std::convert::AsRef::<$crate::GStr>::as_ref(&$key) }; [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 934 | (@key $key:expr_2021) => { std::convert::AsRef::<$crate::GStr>::as_ref(&$key) }; [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:935:20 [INFO] [stdout] | [INFO] [stdout] 935 | (@value $value:expr) => { std::convert::AsRef::<[u8]>::as_ref(&$value) }; [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 935 | (@value $value:expr_2021) => { std::convert::AsRef::<[u8]>::as_ref(&$value) }; [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:936:21 [INFO] [stdout] | [INFO] [stdout] 936 | (@value $format:expr $(,$arg:expr)+) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 936 | (@value $format:expr_2021 $(,$arg:expr)+) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/log.rs:936:34 [INFO] [stdout] | [INFO] [stdout] 936 | (@value $format:expr $(,$arg:expr)+) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 936 | (@value $format:expr $(,$arg:expr_2021)+) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `boxed::BoxedMemoryManager::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:499:19 [INFO] [stdout] | [INFO] [stdout] 499 | let ptr = MM::copy(ptr); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:497:5 [INFO] [stdout] | [INFO] [stdout] 497 | unsafe fn from_glib_none(ptr: *mut T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:500:9 [INFO] [stdout] | [INFO] [stdout] 500 | from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `boxed::BoxedMemoryManager::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:508:19 [INFO] [stdout] | [INFO] [stdout] 508 | let ptr = MM::copy(ptr); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:506:5 [INFO] [stdout] | [INFO] [stdout] 506 | unsafe fn from_glib_none(ptr: *const T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:509:9 [INFO] [stdout] | [INFO] [stdout] 509 | from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:518:20 [INFO] [stdout] | [INFO] [stdout] 518 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:515:5 [INFO] [stdout] | [INFO] [stdout] 515 | unsafe fn from_glib_full(ptr: *mut T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:529:20 [INFO] [stdout] | [INFO] [stdout] 529 | inner: ptr::NonNull::new_unchecked(ptr as *mut T), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:526:5 [INFO] [stdout] | [INFO] [stdout] 526 | unsafe fn from_glib_full(ptr: *const T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:540:20 [INFO] [stdout] | [INFO] [stdout] 540 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:537:5 [INFO] [stdout] | [INFO] [stdout] 537 | unsafe fn from_glib_borrow(ptr: *mut T) -> Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `shared::SharedMemoryManager::ref_` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:558:9 [INFO] [stdout] | [INFO] [stdout] 558 | MM::ref_(ptr); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/shared.rs:556:5 [INFO] [stdout] | [INFO] [stdout] 556 | unsafe fn from_glib_none(ptr: *mut T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:560:20 [INFO] [stdout] | [INFO] [stdout] 560 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `shared::SharedMemoryManager::ref_` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:570:9 [INFO] [stdout] | [INFO] [stdout] 570 | MM::ref_(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/shared.rs:568:5 [INFO] [stdout] | [INFO] [stdout] 568 | unsafe fn from_glib_none(ptr: *const T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:572:20 [INFO] [stdout] | [INFO] [stdout] 572 | inner: ptr::NonNull::new_unchecked(ptr as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:583:20 [INFO] [stdout] | [INFO] [stdout] 583 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/shared.rs:580:5 [INFO] [stdout] | [INFO] [stdout] 580 | unsafe fn from_glib_full(ptr: *mut T) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/shared.rs:594:20 [INFO] [stdout] | [INFO] [stdout] 594 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/shared.rs:591:5 [INFO] [stdout] | [INFO] [stdout] 591 | unsafe fn from_glib_borrow(ptr: *mut T) -> Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:56:18 [INFO] [stdout] | [INFO] [stdout] 56 | &*(ptr as *const *mut $ffi_name as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:50:13 [INFO] [stdout] | [INFO] [stdout] 50 | pub unsafe fn from_glib_ptr_borrow(ptr: &*mut $ffi_name) -> &Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:67:22 [INFO] [stdout] | [INFO] [stdout] 67 | &mut *(ptr as *mut *mut $ffi_name as *mut Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:61:13 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn from_glib_ptr_borrow_mut(ptr: &mut *mut $ffi_name) -> &mut Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:200:28 [INFO] [stdout] | [INFO] [stdout] 200 | inner: $crate::translate::from_glib_none(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:198:13 [INFO] [stdout] | [INFO] [stdout] 198 | unsafe fn from_glib_none(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:210:28 [INFO] [stdout] | [INFO] [stdout] 210 | inner: $crate::translate::from_glib_none(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:208:13 [INFO] [stdout] | [INFO] [stdout] 208 | unsafe fn from_glib_none(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:220:28 [INFO] [stdout] | [INFO] [stdout] 220 | inner: $crate::translate::from_glib_full(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | unsafe fn from_glib_full(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:230:28 [INFO] [stdout] | [INFO] [stdout] 230 | inner: $crate::translate::from_glib_full(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:228:13 [INFO] [stdout] | [INFO] [stdout] 228 | unsafe fn from_glib_full(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::Borrowed::::into_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:241:32 [INFO] [stdout] | [INFO] [stdout] 241 | inner: $crate::translate::from_glib_borrow::<_, $crate::boxed::Boxed<_, _>>(ptr).into_inner(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:238:13 [INFO] [stdout] | [INFO] [stdout] 238 | unsafe fn from_glib_borrow(ptr: *mut $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:241:32 [INFO] [stdout] | [INFO] [stdout] 241 | inner: $crate::translate::from_glib_borrow::<_, $crate::boxed::Boxed<_, _>>(ptr).into_inner(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:251:17 [INFO] [stdout] | [INFO] [stdout] 251 | $crate::translate::from_glib_borrow::<_, Self>(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:250:13 [INFO] [stdout] | [INFO] [stdout] 250 | unsafe fn from_glib_borrow(ptr: *const $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:21 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:257:13 [INFO] [stdout] | [INFO] [stdout] 257 | unsafe fn from_glib_none_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:39 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:55 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:89 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:104 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:267:17 [INFO] [stdout] | [INFO] [stdout] 267 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:272:27 [INFO] [stdout] | [INFO] [stdout] 272 | let res = $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:271:13 [INFO] [stdout] | [INFO] [stdout] 271 | unsafe fn from_glib_container_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:273:17 [INFO] [stdout] | [INFO] [stdout] 273 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:279:21 [INFO] [stdout] | [INFO] [stdout] 279 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:277:13 [INFO] [stdout] | [INFO] [stdout] 277 | unsafe fn from_glib_full_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:285:17 [INFO] [stdout] | [INFO] [stdout] 285 | ::std::ptr::copy_nonoverlapping(ptr as *mut Self, res_ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:286:17 [INFO] [stdout] | [INFO] [stdout] 286 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:287:17 [INFO] [stdout] | [INFO] [stdout] 287 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:295:17 [INFO] [stdout] | [INFO] [stdout] 295 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:294:13 [INFO] [stdout] | [INFO] [stdout] 294 | unsafe fn from_glib_none_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:295:91 [INFO] [stdout] | [INFO] [stdout] 295 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_container_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:299:17 [INFO] [stdout] | [INFO] [stdout] 299 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:298:13 [INFO] [stdout] | [INFO] [stdout] 298 | unsafe fn from_glib_container_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:299:96 [INFO] [stdout] | [INFO] [stdout] 299 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_full_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:303:17 [INFO] [stdout] | [INFO] [stdout] 303 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:302:13 [INFO] [stdout] | [INFO] [stdout] 302 | unsafe fn from_glib_full_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:303:91 [INFO] [stdout] | [INFO] [stdout] 303 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_error_copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/error.rs:18:23 [INFO] [stdout] | [INFO] [stdout] 18 | copy => |ptr| ffi::g_error_copy(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:438:13 [INFO] [stdout] | [INFO] [stdout] 438 | unsafe fn copy($copy_arg: *const Self::Target) -> *mut Self::Target { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_error_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/error.rs:19:23 [INFO] [stdout] | [INFO] [stdout] 19 | free => |ptr| ffi::g_error_free(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:444:13 [INFO] [stdout] | [INFO] [stdout] 444 | unsafe fn free($free_arg: *mut Self::Target) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_dup_boxed` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:353:27 [INFO] [stdout] | [INFO] [stdout] 353 | let ptr = $crate::gobject_ffi::g_value_dup_boxed($crate::translate::ToGlibPtr::to_glib_none(value).0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:352:13 [INFO] [stdout] | [INFO] [stdout] 352 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrFull::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:355:17 [INFO] [stdout] | [INFO] [stdout] 355 | >::from_glib_full(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:365:30 [INFO] [stdout] | [INFO] [stdout] 365 | let value = &*(value as *const $crate::Value as *const $crate::gobject_ffi::GValue); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:364:13 [INFO] [stdout] | [INFO] [stdout] 364 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `error::Error::from_glib_ptr_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:366:17 [INFO] [stdout] | [INFO] [stdout] 366 | ... <$name $(<$($generic),+>)?>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:366:68 [INFO] [stdout] | [INFO] [stdout] 366 | ...tr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:366:71 [INFO] [stdout] | [INFO] [stdout] 366 | ... <$name $(<$($generic),+>)?>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_n... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] ::: src/error.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / wrapper! { [INFO] [stdout] 11 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 12 | | /// A generic error capable of representing various error domains (types). [INFO] [stdout] 13 | | #[derive(PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] ... | [INFO] [stdout] 21 | | } [INFO] [stdout] 22 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::UnsafeFrom::unsafe_from` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:257:9 [INFO] [stdout] | [INFO] [stdout] 257 | T::unsafe_from(self.into()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:255:5 [INFO] [stdout] | [INFO] [stdout] 255 | unsafe fn unsafe_cast(self) -> T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:279:10 [INFO] [stdout] | [INFO] [stdout] 279 | &*(self as *const Self as *const T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:273:5 [INFO] [stdout] | [INFO] [stdout] 273 | unsafe fn unsafe_cast_ref(&self) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:471:26 [INFO] [stdout] | [INFO] [stdout] 471 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | unsafe fn from_glib_none(ptr: *mut gobject_ffi::GObject) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:475:20 [INFO] [stdout] | [INFO] [stdout] 475 | inner: ptr::NonNull::new_unchecked(gobject_ffi::g_object_ref_sink(ptr)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_ref_sink` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:475:48 [INFO] [stdout] | [INFO] [stdout] 475 | inner: ptr::NonNull::new_unchecked(gobject_ffi::g_object_ref_sink(ptr)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:485:9 [INFO] [stdout] | [INFO] [stdout] 485 | from_glib_none(ptr as *mut gobject_ffi::GObject) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:483:5 [INFO] [stdout] | [INFO] [stdout] 483 | unsafe fn from_glib_none(ptr: *const gobject_ffi::GObject) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:494:26 [INFO] [stdout] | [INFO] [stdout] 494 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:492:5 [INFO] [stdout] | [INFO] [stdout] 492 | unsafe fn from_glib_full(ptr: *mut gobject_ffi::GObject) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:497:20 [INFO] [stdout] | [INFO] [stdout] 497 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:507:26 [INFO] [stdout] | [INFO] [stdout] 507 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:505:5 [INFO] [stdout] | [INFO] [stdout] 505 | unsafe fn from_glib_borrow(ptr: *mut gobject_ffi::GObject) -> Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:510:20 [INFO] [stdout] | [INFO] [stdout] 510 | inner: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:519:9 [INFO] [stdout] | [INFO] [stdout] 519 | from_glib_borrow(ptr as *mut gobject_ffi::GObject) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:518:5 [INFO] [stdout] | [INFO] [stdout] 518 | unsafe fn from_glib_borrow(ptr: *const gobject_ffi::GObject) -> Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:704:28 [INFO] [stdout] | [INFO] [stdout] 704 | inner: $crate::object::TypedObjectRef::new(t), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:702:13 [INFO] [stdout] | [INFO] [stdout] 702 | unsafe fn unsafe_from(t: $crate::object::ObjectRef) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:740:34 [INFO] [stdout] | [INFO] [stdout] 740 | debug_assert_ne!((*(*ptr as *const $crate::gobject_ffi::GObject)).ref_count, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:734:13 [INFO] [stdout] | [INFO] [stdout] 734 | unsafe fn from_glib_ptr_borrow(ptr: &*mut Self::GlibType) -> &Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:741:18 [INFO] [stdout] | [INFO] [stdout] 741 | &*(ptr as *const *mut $ffi_name as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:895:31 [INFO] [stdout] | [INFO] [stdout] 895 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:893:13 [INFO] [stdout] | [INFO] [stdout] 893 | unsafe fn from_glib_none(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:28 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:64 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:909:31 [INFO] [stdout] | [INFO] [stdout] 909 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:907:13 [INFO] [stdout] | [INFO] [stdout] 907 | unsafe fn from_glib_none(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:28 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:64 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:923:31 [INFO] [stdout] | [INFO] [stdout] 923 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:921:13 [INFO] [stdout] | [INFO] [stdout] 921 | unsafe fn from_glib_full(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:28 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:64 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:937:31 [INFO] [stdout] | [INFO] [stdout] 937 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:935:13 [INFO] [stdout] | [INFO] [stdout] 935 | unsafe fn from_glib_borrow(ptr: *mut $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:32 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner(... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_get_type() [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::Borrowed::::into_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner(... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_get_type() [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).in... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_get_type() [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:952:17 [INFO] [stdout] | [INFO] [stdout] 952 | $crate::translate::from_glib_borrow::<_, Self>(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:951:13 [INFO] [stdout] | [INFO] [stdout] 951 | unsafe fn from_glib_borrow(ptr: *const $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:21 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:958:13 [INFO] [stdout] | [INFO] [stdout] 958 | unsafe fn from_glib_none_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:39 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:55 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:89 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:104 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:968:17 [INFO] [stdout] | [INFO] [stdout] 968 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:973:27 [INFO] [stdout] | [INFO] [stdout] 973 | let res = $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:972:13 [INFO] [stdout] | [INFO] [stdout] 972 | unsafe fn from_glib_container_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:974:17 [INFO] [stdout] | [INFO] [stdout] 974 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:980:21 [INFO] [stdout] | [INFO] [stdout] 980 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:978:13 [INFO] [stdout] | [INFO] [stdout] 978 | unsafe fn from_glib_full_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:986:17 [INFO] [stdout] | [INFO] [stdout] 986 | ::std::ptr::copy_nonoverlapping(ptr as *mut Self, res_ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:987:17 [INFO] [stdout] | [INFO] [stdout] 987 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:988:17 [INFO] [stdout] | [INFO] [stdout] 988 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:17 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:995:13 [INFO] [stdout] | [INFO] [stdout] 995 | unsafe fn from_glib_none_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:91 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_container_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:17 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_ge... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:999:13 [INFO] [stdout] | [INFO] [stdout] 999 | unsafe fn from_glib_container_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:96 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_full_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:17 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1003:13 [INFO] [stdout] | [INFO] [stdout] 1003 | unsafe fn from_glib_full_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:91 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1011:17 [INFO] [stdout] | [INFO] [stdout] 1011 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr as *mut *mut _, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1010:13 [INFO] [stdout] | [INFO] [stdout] 1010 | unsafe fn from_glib_none_num_as_vec(ptr: *const *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1028:17 [INFO] [stdout] | [INFO] [stdout] 1028 | $crate::translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec(ptr as *mut *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1027:13 [INFO] [stdout] | [INFO] [stdout] 1027 | unsafe fn from_glib_none_as_vec(ptr: *const *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_dup_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1065:27 [INFO] [stdout] | [INFO] [stdout] 1065 | let ptr = $crate::gobject_ffi::g_value_dup_object($crate::translate::ToGlibPtr::to_glib_none(value).0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1064:13 [INFO] [stdout] | [INFO] [stdout] 1064 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1067:34 [INFO] [stdout] | [INFO] [stdout] 1067 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrFull::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1068:17 [INFO] [stdout] | [INFO] [stdout] 1068 | >::from_glib_full(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1078:30 [INFO] [stdout] | [INFO] [stdout] 1078 | let value = &*(value as *const $crate::Value as *const $crate::gobject_ffi::GValue); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1077:13 [INFO] [stdout] | [INFO] [stdout] 1077 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectType::from_glib_ptr_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:17 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_get_type() [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:98 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_nam... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_get_type() [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:101 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $cr... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] ... [INFO] [stdout] 1371 | / glib_object_wrapper!(@object [INFO] [stdout] 1372 | | [doc = "The base class in the object hierarchy."] [INFO] [stdout] 1373 | | pub Object, *mut std::os::raw::c_void, (), gobject_ffi::GObject, @ffi_class gobject_ffi::GObjectClass, @type_ gobject_ffi::g_object_g... [INFO] [stdout] 1374 | | ); [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib_object_wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_type_test_flags` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1446:12 [INFO] [stdout] | [INFO] [stdout] 1446 | if gobject_ffi::g_type_test_flags( [INFO] [stdout] | ____________^ [INFO] [stdout] 1447 | | type_.into_glib(), [INFO] [stdout] 1448 | | gobject_ffi::G_TYPE_FLAG_INSTANTIATABLE, [INFO] [stdout] 1449 | | ) == ffi::GFALSE [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1441:5 [INFO] [stdout] | [INFO] [stdout] 1441 | pub unsafe fn new_internal(type_: Type, properties: &mut [(&str, Value)]) -> Object { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_type_test_flags` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1454:12 [INFO] [stdout] | [INFO] [stdout] 1454 | if gobject_ffi::g_type_test_flags(type_.into_glib(), gobject_ffi::G_TYPE_FLAG_ABSTRACT) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1487:38 [INFO] [stdout] | [INFO] [stdout] 1487 | property_values.push(*value.to_glib_none().0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_new_with_properties` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1491:19 [INFO] [stdout] | [INFO] [stdout] 1491 | let ptr = gobject_ffi::g_object_new_with_properties( [INFO] [stdout] | ___________________^ [INFO] [stdout] 1492 | | type_.into_glib(), [INFO] [stdout] 1493 | | properties.len() as u32, [INFO] [stdout] 1494 | | mut_override(property_names.as_ptr() as *const *const _), [INFO] [stdout] 1495 | | property_values.as_ptr(), [INFO] [stdout] 1496 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1502:13 [INFO] [stdout] | [INFO] [stdout] 1502 | from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1504:13 [INFO] [stdout] | [INFO] [stdout] 1504 | from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_set_qdata_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2483:9 [INFO] [stdout] | [INFO] [stdout] 2483 | / gobject_ffi::g_object_set_qdata_full( [INFO] [stdout] 2484 | | self.as_object_ref().to_glib_none().0, [INFO] [stdout] 2485 | | key.into_glib(), [INFO] [stdout] 2486 | | ptr, [INFO] [stdout] 2487 | | Some(drop_value::), [INFO] [stdout] 2488 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2475:5 [INFO] [stdout] | [INFO] [stdout] 2475 | unsafe fn set_qdata(&self, key: Quark, value: QD) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2478:34 [INFO] [stdout] | [INFO] [stdout] 2478 | let value: Box = Box::from_raw(ptr as *mut QD); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2476:9 [INFO] [stdout] | [INFO] [stdout] 2476 | unsafe extern "C" fn drop_value(ptr: ffi::gpointer) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_get_qdata` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2492:27 [INFO] [stdout] | [INFO] [stdout] 2492 | ptr::NonNull::new(gobject_ffi::g_object_get_qdata( [INFO] [stdout] | ___________________________^ [INFO] [stdout] 2493 | | self.as_object_ref().to_glib_none().0, [INFO] [stdout] 2494 | | key.into_glib(), [INFO] [stdout] 2495 | | ) as *mut QD) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2491:5 [INFO] [stdout] | [INFO] [stdout] 2491 | unsafe fn qdata(&self, key: Quark) -> Option> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_steal_qdata` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2499:19 [INFO] [stdout] | [INFO] [stdout] 2499 | let ptr = gobject_ffi::g_object_steal_qdata( [INFO] [stdout] | ___________________^ [INFO] [stdout] 2500 | | self.as_object_ref().to_glib_none().0, [INFO] [stdout] 2501 | | key.into_glib(), [INFO] [stdout] 2502 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2498:5 [INFO] [stdout] | [INFO] [stdout] 2498 | unsafe fn steal_qdata(&self, key: Quark) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2506:34 [INFO] [stdout] | [INFO] [stdout] 2506 | let value: Box = Box::from_raw(ptr as *mut QD); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectExt::set_qdata` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2512:9 [INFO] [stdout] | [INFO] [stdout] 2512 | self.set_qdata::(Quark::from_str(key), value) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2511:5 [INFO] [stdout] | [INFO] [stdout] 2511 | unsafe fn set_data(&self, key: &str, value: QD) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectExt::qdata` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2516:9 [INFO] [stdout] | [INFO] [stdout] 2516 | self.qdata::(Quark::from_str(key)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2515:5 [INFO] [stdout] | [INFO] [stdout] 2515 | unsafe fn data(&self, key: &str) -> Option> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectExt::steal_qdata` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2520:9 [INFO] [stdout] | [INFO] [stdout] 2520 | self.steal_qdata::(Quark::from_str(key)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2519:5 [INFO] [stdout] | [INFO] [stdout] 2519 | unsafe fn steal_data(&self, key: &str) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectExt::connect_unsafe_id` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2631:9 [INFO] [stdout] | [INFO] [stdout] 2631 | self.connect_unsafe_id(signal_id, details, after, callback) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2619:5 [INFO] [stdout] | [INFO] [stdout] 2619 | / unsafe fn connect_unsafe( [INFO] [stdout] 2620 | | &self, [INFO] [stdout] 2621 | | signal_name: &str, [INFO] [stdout] 2622 | | after: bool, [INFO] [stdout] ... | [INFO] [stdout] 2625 | | where [INFO] [stdout] 2626 | | F: Fn(&[Value]) -> Option, [INFO] [stdout] | |_________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `closure::Closure::new_unsafe` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2652:13 [INFO] [stdout] | [INFO] [stdout] 2652 | / Closure::new_unsafe(move |values| { [INFO] [stdout] 2653 | | let ret = callback(values); [INFO] [stdout] 2654 | | if let Some(ret) = ret { [INFO] [stdout] 2655 | | panic!( [INFO] [stdout] ... | [INFO] [stdout] 2660 | | None [INFO] [stdout] 2661 | | }) [INFO] [stdout] | |______________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:2635:5 [INFO] [stdout] | [INFO] [stdout] 2635 | / unsafe fn connect_unsafe_id( [INFO] [stdout] 2636 | | &self, [INFO] [stdout] 2637 | | signal_id: SignalId, [INFO] [stdout] 2638 | | details: Option, [INFO] [stdout] ... | [INFO] [stdout] 2642 | | where [INFO] [stdout] 2643 | | F: Fn(&[Value]) -> Option, [INFO] [stdout] | |_________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `closure::Closure::new_unsafe` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2663:13 [INFO] [stdout] | [INFO] [stdout] 2663 | / Closure::new_unsafe(move |values| { [INFO] [stdout] 2664 | | let mut ret = callback(values).unwrap_or_else(|| { [INFO] [stdout] 2665 | | panic!( [INFO] [stdout] 2666 | | "Signal '{signal_name}' of type '{type_}' required return value of type '{}' but got None", [INFO] [stdout] ... | [INFO] [stdout] 2684 | | Some(ret) [INFO] [stdout] 2685 | | }) [INFO] [stdout] | |______________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2670:40 [INFO] [stdout] | [INFO] [stdout] 2670 | let valid_type: bool = from_glib(gobject_ffi::g_type_check_value_holds( [INFO] [stdout] | ________________________________________^ [INFO] [stdout] 2671 | | mut_override(ret.to_glib_none().0), [INFO] [stdout] 2672 | | return_type.into_glib(), [INFO] [stdout] 2673 | | )); [INFO] [stdout] | |__________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_type_check_value_holds` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2670:50 [INFO] [stdout] | [INFO] [stdout] 2670 | let valid_type: bool = from_glib(gobject_ffi::g_type_check_value_holds( [INFO] [stdout] | __________________________________________________^ [INFO] [stdout] 2671 | | mut_override(ret.to_glib_none().0), [INFO] [stdout] 2672 | | return_type.into_glib(), [INFO] [stdout] 2673 | | )); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_signal_connect_closure_by_id` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2693:23 [INFO] [stdout] | [INFO] [stdout] 2693 | let handler = gobject_ffi::g_signal_connect_closure_by_id( [INFO] [stdout] | _______________________^ [INFO] [stdout] 2694 | | self.as_object_ref().to_glib_none().0, [INFO] [stdout] 2695 | | signal_id.into_glib(), [INFO] [stdout] 2696 | | details.into_glib(), [INFO] [stdout] 2697 | | closure.as_ref().to_glib_none().0, [INFO] [stdout] 2698 | | after.into_glib(), [INFO] [stdout] 2699 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:2705:9 [INFO] [stdout] | [INFO] [stdout] 2705 | from_glib(handler) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `signal::connect_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3072:9 [INFO] [stdout] | [INFO] [stdout] 3072 | / crate::signal::connect_raw( [INFO] [stdout] 3073 | | self.as_object_ref().to_glib_none().0, [INFO] [stdout] 3074 | | signal_name.as_ptr() as *const _, [INFO] [stdout] 3075 | | Some(mem::transmute::<*const (), unsafe extern "C" fn()>( [INFO] [stdout] ... | [INFO] [stdout] 3078 | | Box::into_raw(f), [INFO] [stdout] 3079 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3046:5 [INFO] [stdout] | [INFO] [stdout] 3046 | / unsafe fn connect_notify_unsafe( [INFO] [stdout] 3047 | | &self, [INFO] [stdout] 3048 | | name: Option<&str>, [INFO] [stdout] 3049 | | f: F, [INFO] [stdout] 3050 | | ) -> SignalHandlerId { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3075:18 [INFO] [stdout] | [INFO] [stdout] 3075 | Some(mem::transmute::<*const (), unsafe extern "C" fn()>( [INFO] [stdout] | __________________^ [INFO] [stdout] 3076 | | notify_trampoline:: as *const (), [INFO] [stdout] 3077 | | )), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3058:26 [INFO] [stdout] | [INFO] [stdout] 3058 | let f: &F = &*(f as *const F); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3051:9 [INFO] [stdout] | [INFO] [stdout] 3051 | / unsafe extern "C" fn notify_trampoline( [INFO] [stdout] 3052 | | this: *mut gobject_ffi::GObject, [INFO] [stdout] 3053 | | param_spec: *mut gobject_ffi::GParamSpec, [INFO] [stdout] 3054 | | f: ffi::gpointer, [INFO] [stdout] 3055 | | ) where [INFO] [stdout] 3056 | | P: ObjectType, [INFO] [stdout] | |__________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::Cast::unsafe_cast_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3060:17 [INFO] [stdout] | [INFO] [stdout] 3060 | Object::from_glib_borrow(this).unsafe_cast_ref(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrBorrow::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3060:17 [INFO] [stdout] | [INFO] [stdout] 3060 | Object::from_glib_borrow(this).unsafe_cast_ref(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3061:18 [INFO] [stdout] | [INFO] [stdout] 3061 | &from_glib_borrow(param_spec), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_object_run_dispose` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3145:9 [INFO] [stdout] | [INFO] [stdout] 3145 | gobject_ffi::g_object_run_dispose(self.as_ptr() as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3144:5 [INFO] [stdout] | [INFO] [stdout] 3144 | unsafe fn run_dispose(&self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3175:9 [INFO] [stdout] | [INFO] [stdout] 3175 | from_glib_borrow(self.0.as_ptr()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3171:5 [INFO] [stdout] | [INFO] [stdout] 3171 | / pub unsafe fn borrow(&self) -> Borrowed [INFO] [stdout] 3172 | | where [INFO] [stdout] 3173 | | T: FromGlibPtrBorrow<*mut ::GlibType>, [INFO] [stdout] | |_______________________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:704:28 [INFO] [stdout] | [INFO] [stdout] 704 | inner: $crate::object::TypedObjectRef::new(t), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:702:13 [INFO] [stdout] | [INFO] [stdout] 702 | unsafe fn unsafe_from(t: $crate::object::ObjectRef) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:740:34 [INFO] [stdout] | [INFO] [stdout] 740 | debug_assert_ne!((*(*ptr as *const $crate::gobject_ffi::GObject)).ref_count, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:734:13 [INFO] [stdout] | [INFO] [stdout] 734 | unsafe fn from_glib_ptr_borrow(ptr: &*mut Self::GlibType) -> &Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:741:18 [INFO] [stdout] | [INFO] [stdout] 741 | &*(ptr as *const *mut $ffi_name as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:895:31 [INFO] [stdout] | [INFO] [stdout] 895 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:893:13 [INFO] [stdout] | [INFO] [stdout] 893 | unsafe fn from_glib_none(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:28 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:64 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:909:31 [INFO] [stdout] | [INFO] [stdout] 909 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:907:13 [INFO] [stdout] | [INFO] [stdout] 907 | unsafe fn from_glib_none(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:28 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:64 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:923:31 [INFO] [stdout] | [INFO] [stdout] 923 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:921:13 [INFO] [stdout] | [INFO] [stdout] 921 | unsafe fn from_glib_full(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:28 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:64 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:937:31 [INFO] [stdout] | [INFO] [stdout] 937 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:935:13 [INFO] [stdout] | [INFO] [stdout] 935 | unsafe fn from_glib_borrow(ptr: *mut $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:32 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner(... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::Borrowed::::into_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner(... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).in... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:952:17 [INFO] [stdout] | [INFO] [stdout] 952 | $crate::translate::from_glib_borrow::<_, Self>(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:951:13 [INFO] [stdout] | [INFO] [stdout] 951 | unsafe fn from_glib_borrow(ptr: *const $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:21 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:958:13 [INFO] [stdout] | [INFO] [stdout] 958 | unsafe fn from_glib_none_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:39 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:55 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:89 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:104 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:968:17 [INFO] [stdout] | [INFO] [stdout] 968 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:973:27 [INFO] [stdout] | [INFO] [stdout] 973 | let res = $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:972:13 [INFO] [stdout] | [INFO] [stdout] 972 | unsafe fn from_glib_container_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:974:17 [INFO] [stdout] | [INFO] [stdout] 974 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:980:21 [INFO] [stdout] | [INFO] [stdout] 980 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:978:13 [INFO] [stdout] | [INFO] [stdout] 978 | unsafe fn from_glib_full_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:986:17 [INFO] [stdout] | [INFO] [stdout] 986 | ::std::ptr::copy_nonoverlapping(ptr as *mut Self, res_ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:987:17 [INFO] [stdout] | [INFO] [stdout] 987 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:988:17 [INFO] [stdout] | [INFO] [stdout] 988 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:17 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:995:13 [INFO] [stdout] | [INFO] [stdout] 995 | unsafe fn from_glib_none_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:91 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_container_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:17 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:999:13 [INFO] [stdout] | [INFO] [stdout] 999 | unsafe fn from_glib_container_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:96 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_full_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:17 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1003:13 [INFO] [stdout] | [INFO] [stdout] 1003 | unsafe fn from_glib_full_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:91 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1011:17 [INFO] [stdout] | [INFO] [stdout] 1011 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr as *mut *mut _, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1010:13 [INFO] [stdout] | [INFO] [stdout] 1010 | unsafe fn from_glib_none_num_as_vec(ptr: *const *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1028:17 [INFO] [stdout] | [INFO] [stdout] 1028 | $crate::translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec(ptr as *mut *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1027:13 [INFO] [stdout] | [INFO] [stdout] 1027 | unsafe fn from_glib_none_as_vec(ptr: *const *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_dup_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1065:27 [INFO] [stdout] | [INFO] [stdout] 1065 | let ptr = $crate::gobject_ffi::g_value_dup_object($crate::translate::ToGlibPtr::to_glib_none(value).0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1064:13 [INFO] [stdout] | [INFO] [stdout] 1064 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1067:34 [INFO] [stdout] | [INFO] [stdout] 1067 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrFull::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1068:17 [INFO] [stdout] | [INFO] [stdout] 1068 | >::from_glib_full(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1078:30 [INFO] [stdout] | [INFO] [stdout] 1078 | let value = &*(value as *const $crate::Value as *const $crate::gobject_ffi::GValue); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1077:13 [INFO] [stdout] | [INFO] [stdout] 1077 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectType::from_glib_ptr_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:17 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:98 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_nam... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:101 [INFO] [stdout] | [INFO] [stdout] 1079 | <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $cr... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] ... [INFO] [stdout] 3370 | / wrapper! { [INFO] [stdout] 3371 | | #[doc(alias = "GInitiallyUnowned")] [INFO] [stdout] 3372 | | pub struct InitiallyUnowned(Object); [INFO] [stdout] ... | [INFO] [stdout] 3376 | | } [INFO] [stdout] 3377 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3395:44 [INFO] [stdout] | [INFO] [stdout] 3395 | let callback: Box> = Box::from_raw(data as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3392:1 [INFO] [stdout] | [INFO] [stdout] 3392 | unsafe extern "C" fn notify_func(data: ffi::gpointer, _obj: *mut gobject_ffi::GObject) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3796:35 [INFO] [stdout] | [INFO] [stdout] 3796 | let transform_data = &*(user_data [INFO] [stdout] | ___________________________________^ [INFO] [stdout] 3797 | | as *const (TransformFn, TransformFn, crate::ParamSpec, crate::ParamSpec)); [INFO] [stdout] | |_________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3790:9 [INFO] [stdout] | [INFO] [stdout] 3790 | / unsafe extern "C" fn transform_to_trampoline( [INFO] [stdout] 3791 | | binding: *mut gobject_ffi::GBinding, [INFO] [stdout] 3792 | | from_value: *const gobject_ffi::GValue, [INFO] [stdout] 3793 | | to_value: *mut gobject_ffi::GValue, [INFO] [stdout] 3794 | | user_data: ffi::gpointer, [INFO] [stdout] 3795 | | ) -> ffi::gboolean { [INFO] [stdout] | |__________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3800:18 [INFO] [stdout] | [INFO] [stdout] 3800 | &from_glib_borrow(binding), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3801:18 [INFO] [stdout] | [INFO] [stdout] 3801 | &*(from_value as *const Value), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3812:21 [INFO] [stdout] | [INFO] [stdout] 3812 | *to_value = res.into_raw(); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3825:35 [INFO] [stdout] | [INFO] [stdout] 3825 | let transform_data = &*(user_data [INFO] [stdout] | ___________________________________^ [INFO] [stdout] 3826 | | as *const (TransformFn, TransformFn, crate::ParamSpec, crate::ParamSpec)); [INFO] [stdout] | |_________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3819:9 [INFO] [stdout] | [INFO] [stdout] 3819 | / unsafe extern "C" fn transform_from_trampoline( [INFO] [stdout] 3820 | | binding: *mut gobject_ffi::GBinding, [INFO] [stdout] 3821 | | from_value: *const gobject_ffi::GValue, [INFO] [stdout] 3822 | | to_value: *mut gobject_ffi::GValue, [INFO] [stdout] 3823 | | user_data: ffi::gpointer, [INFO] [stdout] 3824 | | ) -> ffi::gboolean { [INFO] [stdout] | |__________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3829:18 [INFO] [stdout] | [INFO] [stdout] 3829 | &from_glib_borrow(binding), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3830:18 [INFO] [stdout] | [INFO] [stdout] 3830 | &*(from_value as *const Value), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3841:21 [INFO] [stdout] | [INFO] [stdout] 3841 | *to_value = res.into_raw(); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:3849:21 [INFO] [stdout] | [INFO] [stdout] 3849 | let _ = Box::from_raw( [INFO] [stdout] | _____________________^ [INFO] [stdout] 3850 | | data as *mut (TransformFn, TransformFn, crate::ParamSpec, crate::ParamSpec), [INFO] [stdout] 3851 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:3848:9 [INFO] [stdout] | [INFO] [stdout] 3848 | unsafe extern "C" fn free_transform_data(data: ffi::gpointer) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:4446:18 [INFO] [stdout] | [INFO] [stdout] 4446 | ptr: ptr::NonNull::new_unchecked(ptr as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:4444:5 [INFO] [stdout] | [INFO] [stdout] 4444 | pub unsafe fn new(ptr: *mut T::GlibType) -> BorrowedObject<'a, T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:704:28 [INFO] [stdout] | [INFO] [stdout] 704 | inner: $crate::object::TypedObjectRef::new(t), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:702:13 [INFO] [stdout] | [INFO] [stdout] 702 | unsafe fn unsafe_from(t: $crate::object::ObjectRef) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:740:34 [INFO] [stdout] | [INFO] [stdout] 740 | debug_assert_ne!((*(*ptr as *const $crate::gobject_ffi::GObject)).ref_count, 0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:734:13 [INFO] [stdout] | [INFO] [stdout] 734 | unsafe fn from_glib_ptr_borrow(ptr: &*mut Self::GlibType) -> &Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:741:18 [INFO] [stdout] | [INFO] [stdout] 741 | &*(ptr as *const *mut $ffi_name as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:895:31 [INFO] [stdout] | [INFO] [stdout] 895 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:893:13 [INFO] [stdout] | [INFO] [stdout] 893 | unsafe fn from_glib_none(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:28 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:897:64 [INFO] [stdout] | [INFO] [stdout] 897 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:909:31 [INFO] [stdout] | [INFO] [stdout] 909 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:907:13 [INFO] [stdout] | [INFO] [stdout] 907 | unsafe fn from_glib_none(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:28 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:911:64 [INFO] [stdout] | [INFO] [stdout] 911 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_none(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:923:31 [INFO] [stdout] | [INFO] [stdout] 923 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:921:13 [INFO] [stdout] | [INFO] [stdout] 921 | unsafe fn from_glib_full(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:28 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:925:64 [INFO] [stdout] | [INFO] [stdout] 925 | inner: $crate::object::TypedObjectRef::new($crate::translate::from_glib_full(ptr as *mut _)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types::instance_of` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:937:31 [INFO] [stdout] | [INFO] [stdout] 937 | debug_assert!($crate::types::instance_of::(ptr as *const _)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:935:13 [INFO] [stdout] | [INFO] [stdout] 935 | unsafe fn from_glib_borrow(ptr: *mut $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::TypedObjectRef::::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:32 [INFO] [stdout] | [INFO] [stdout] 940 | ...r: $crate::object::TypedObjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::Borrowed::::into_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | ...f::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:940:68 [INFO] [stdout] | [INFO] [stdout] 940 | ...bjectRef::new($crate::translate::from_glib_borrow::<_, $crate::object::ObjectRef>(ptr as *mut _).into_inner()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:952:17 [INFO] [stdout] | [INFO] [stdout] 952 | $crate::translate::from_glib_borrow::<_, Self>(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:951:13 [INFO] [stdout] | [INFO] [stdout] 951 | unsafe fn from_glib_borrow(ptr: *const $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:21 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:958:13 [INFO] [stdout] | [INFO] [stdout] 958 | unsafe fn from_glib_none_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:39 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:55 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:89 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:966:104 [INFO] [stdout] | [INFO] [stdout] 966 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:968:17 [INFO] [stdout] | [INFO] [stdout] 968 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:973:27 [INFO] [stdout] | [INFO] [stdout] 973 | let res = $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:972:13 [INFO] [stdout] | [INFO] [stdout] 972 | unsafe fn from_glib_container_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:974:17 [INFO] [stdout] | [INFO] [stdout] 974 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:980:21 [INFO] [stdout] | [INFO] [stdout] 980 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:978:13 [INFO] [stdout] | [INFO] [stdout] 978 | unsafe fn from_glib_full_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:986:17 [INFO] [stdout] | [INFO] [stdout] 986 | ::std::ptr::copy_nonoverlapping(ptr as *mut Self, res_ptr, num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:987:17 [INFO] [stdout] | [INFO] [stdout] 987 | res.set_len(num); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:988:17 [INFO] [stdout] | [INFO] [stdout] 988 | $crate::ffi::g_free(ptr as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:17 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:995:13 [INFO] [stdout] | [INFO] [stdout] 995 | unsafe fn from_glib_none_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:996:91 [INFO] [stdout] | [INFO] [stdout] 996 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_container_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:17 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:999:13 [INFO] [stdout] | [INFO] [stdout] 999 | unsafe fn from_glib_container_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1000:96 [INFO] [stdout] | [INFO] [stdout] 1000 | $crate::translate::FromGlibContainerAsVec::from_glib_container_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_full_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:17 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1003:13 [INFO] [stdout] | [INFO] [stdout] 1003 | unsafe fn from_glib_full_as_vec(ptr: *mut *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::c_ptr_array_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1004:91 [INFO] [stdout] | [INFO] [stdout] 1004 | $crate::translate::FromGlibContainerAsVec::from_glib_full_num_as_vec(ptr, $crate::translate::c_ptr_array_len(ptr)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibContainerAsVec::from_glib_none_num_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1011:17 [INFO] [stdout] | [INFO] [stdout] 1011 | $crate::translate::FromGlibContainerAsVec::from_glib_none_num_as_vec(ptr as *mut *mut _, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1010:13 [INFO] [stdout] | [INFO] [stdout] 1010 | unsafe fn from_glib_none_num_as_vec(ptr: *const *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1028:17 [INFO] [stdout] | [INFO] [stdout] 1028 | $crate::translate::FromGlibPtrArrayContainerAsVec::from_glib_none_as_vec(ptr as *mut *mut _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1027:13 [INFO] [stdout] | [INFO] [stdout] 1027 | unsafe fn from_glib_none_as_vec(ptr: *const *mut $ffi_name) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_dup_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1065:27 [INFO] [stdout] | [INFO] [stdout] 1065 | let ptr = $crate::gobject_ffi::g_value_dup_object($crate::translate::ToGlibPtr::to_glib_none(value).0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1064:13 [INFO] [stdout] | [INFO] [stdout] 1064 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1067:34 [INFO] [stdout] | [INFO] [stdout] 1067 | debug_assert_ne!((*ptr).ref_count, 0); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrFull::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1068:17 [INFO] [stdout] | [INFO] [stdout] 1068 | >::from_glib_full(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1078:30 [INFO] [stdout] | [INFO] [stdout] 1078 | let value = &*(value as *const $crate::Value as *const $crate::gobject_ffi::GValue); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object.rs:1077:13 [INFO] [stdout] | [INFO] [stdout] 1077 | unsafe fn from_value(value: &'a $crate::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `object::ObjectType::from_glib_ptr_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:17 [INFO] [stdout] | [INFO] [stdout] 1079 | ... <$name $(<$($generic),+>)? as $crate::object::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:98 [INFO] [stdout] | [INFO] [stdout] 1079 | ...tr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/object.rs:1079:101 [INFO] [stdout] | [INFO] [stdout] 1079 | ...ject::ObjectType>::from_glib_ptr_borrow(&*(&value.data[0].v_pointer as *const $crate::ffi::gpointer as *const *mut $ffi_name)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] ::: src/boxed_any_object.rs:99:1 [INFO] [stdout] | [INFO] [stdout] 99 | / glib::wrapper! { [INFO] [stdout] 100 | | // rustdoc-stripper-ignore-next [INFO] [stdout] 101 | | /// This is a subclass of `glib::object::Object` capable of storing any Rust type. [INFO] [stdout] 102 | | /// It let's you insert a Rust type anywhere a `glib::object::Object` is needed. [INFO] [stdout] ... | [INFO] [stdout] 133 | | pub struct BoxedAnyObject(ObjectSubclass); [INFO] [stdout] 134 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_object_wrapper` which comes from the expansion of the macro `glib::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:431:20 [INFO] [stdout] | [INFO] [stdout] 431 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:428:5 [INFO] [stdout] | [INFO] [stdout] 428 | pub unsafe fn from_glib_borrow<'a>(ptr: *const ::GlibType) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:431:22 [INFO] [stdout] | [INFO] [stdout] 431 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_borrow_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:435:9 [INFO] [stdout] | [INFO] [stdout] 435 | Self::from_glib_borrow_num(ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:454:13 [INFO] [stdout] | [INFO] [stdout] 454 | std::slice::from_raw_parts(ptr as *const T, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:441:5 [INFO] [stdout] | [INFO] [stdout] 441 | / pub unsafe fn from_glib_borrow_num<'a>( [INFO] [stdout] 442 | | ptr: *const ::GlibType, [INFO] [stdout] 443 | | len: usize, [INFO] [stdout] 444 | | ) -> &'a [T] { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_borrow_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:476:21 [INFO] [stdout] | [INFO] [stdout] 476 | let s = Self::from_glib_borrow_num(ptr, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:461:5 [INFO] [stdout] | [INFO] [stdout] 461 | / pub unsafe fn from_glib_none_num( [INFO] [stdout] 462 | | ptr: *const ::GlibType, [INFO] [stdout] 463 | | len: usize, [INFO] [stdout] 464 | | _null_terminated: bool, [INFO] [stdout] 465 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:496:13 [INFO] [stdout] | [INFO] [stdout] 496 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:484:5 [INFO] [stdout] | [INFO] [stdout] 484 | / pub unsafe fn from_glib_container_num( [INFO] [stdout] 485 | | ptr: *mut ::GlibType, [INFO] [stdout] 486 | | len: usize, [INFO] [stdout] 487 | | null_terminated: bool, [INFO] [stdout] 488 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:501:25 [INFO] [stdout] | [INFO] [stdout] 501 | let p = ptr.add(i) as *mut T; [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:502:32 [INFO] [stdout] | [INFO] [stdout] 502 | let clone: T = (*p).clone(); [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:503:17 [INFO] [stdout] | [INFO] [stdout] 503 | ptr::write(p, clone); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:507:13 [INFO] [stdout] | [INFO] [stdout] 507 | Self::from_glib_full_num(ptr, len, null_terminated) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:526:13 [INFO] [stdout] | [INFO] [stdout] 526 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:514:5 [INFO] [stdout] | [INFO] [stdout] 514 | / pub unsafe fn from_glib_full_num( [INFO] [stdout] 515 | | ptr: *mut ::GlibType, [INFO] [stdout] 516 | | len: usize, [INFO] [stdout] 517 | | null_terminated: bool, [INFO] [stdout] 518 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:531:26 [INFO] [stdout] | [INFO] [stdout] 531 | ptr: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_realloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:540:23 [INFO] [stdout] | [INFO] [stdout] 540 | let ptr = ffi::g_realloc( [INFO] [stdout] | _______________________^ [INFO] [stdout] 541 | | ptr as *mut _, [INFO] [stdout] 542 | | mem::size_of::().checked_mul(capacity).unwrap(), [INFO] [stdout] 543 | | ) as *mut ::GlibType; [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:545:13 [INFO] [stdout] | [INFO] [stdout] 545 | / ptr::write( [INFO] [stdout] 546 | | ptr.add(len), [INFO] [stdout] 547 | | Ptr::from(ptr::null_mut::<::GlibType>()), [INFO] [stdout] 548 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:546:17 [INFO] [stdout] | [INFO] [stdout] 546 | ptr.add(len), [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:551:22 [INFO] [stdout] | [INFO] [stdout] 551 | ptr: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:564:20 [INFO] [stdout] | [INFO] [stdout] 564 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:561:5 [INFO] [stdout] | [INFO] [stdout] 561 | pub unsafe fn from_glib_none(ptr: *const ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:564:22 [INFO] [stdout] | [INFO] [stdout] 564 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:569:9 [INFO] [stdout] | [INFO] [stdout] 569 | PtrSlice::from_glib_none_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:578:20 [INFO] [stdout] | [INFO] [stdout] 578 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:575:5 [INFO] [stdout] | [INFO] [stdout] 575 | pub unsafe fn from_glib_container(ptr: *mut ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:578:22 [INFO] [stdout] | [INFO] [stdout] 578 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_container_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:583:9 [INFO] [stdout] | [INFO] [stdout] 583 | PtrSlice::from_glib_container_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:592:20 [INFO] [stdout] | [INFO] [stdout] 592 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:589:5 [INFO] [stdout] | [INFO] [stdout] 589 | pub unsafe fn from_glib_full(ptr: *mut ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:592:22 [INFO] [stdout] | [INFO] [stdout] 592 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:597:9 [INFO] [stdout] | [INFO] [stdout] 597 | PtrSlice::from_glib_full_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:920:9 [INFO] [stdout] | [INFO] [stdout] 920 | Self::from_glib_none_num(ptr, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:919:5 [INFO] [stdout] | [INFO] [stdout] 919 | unsafe fn from_glib_none_num(ptr: *mut ::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_container_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:928:9 [INFO] [stdout] | [INFO] [stdout] 928 | Self::from_glib_container_num(ptr, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:924:5 [INFO] [stdout] | [INFO] [stdout] 924 | / unsafe fn from_glib_container_num( [INFO] [stdout] 925 | | ptr: *mut ::GlibType, [INFO] [stdout] 926 | | num: usize, [INFO] [stdout] 927 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:933:9 [INFO] [stdout] | [INFO] [stdout] 933 | Self::from_glib_full_num(ptr, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:932:5 [INFO] [stdout] | [INFO] [stdout] 932 | unsafe fn from_glib_full_num(ptr: *mut ::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:942:9 [INFO] [stdout] | [INFO] [stdout] 942 | Self::from_glib_none_num(ptr, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:941:5 [INFO] [stdout] | [INFO] [stdout] 941 | unsafe fn from_glib_none_num(ptr: *const ::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:966:9 [INFO] [stdout] | [INFO] [stdout] 966 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:965:5 [INFO] [stdout] | [INFO] [stdout] 965 | unsafe fn from_glib_none(ptr: *mut ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:971:9 [INFO] [stdout] | [INFO] [stdout] 971 | Self::from_glib_container(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:970:5 [INFO] [stdout] | [INFO] [stdout] 970 | unsafe fn from_glib_container(ptr: *mut ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:976:9 [INFO] [stdout] | [INFO] [stdout] 976 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:975:5 [INFO] [stdout] | [INFO] [stdout] 975 | unsafe fn from_glib_full(ptr: *mut ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::ptr_slice::PtrSlice::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/ptr_slice.rs:986:9 [INFO] [stdout] | [INFO] [stdout] 986 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/ptr_slice.rs:985:5 [INFO] [stdout] | [INFO] [stdout] 985 | unsafe fn from_glib_none(ptr: *const ::GlibType) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:411:13 [INFO] [stdout] | [INFO] [stdout] 411 | std::slice::from_raw_parts(ptr as *const T, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:405:5 [INFO] [stdout] | [INFO] [stdout] 405 | pub unsafe fn from_glib_borrow_num<'a>(ptr: *const T::GlibType, len: usize) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:424:13 [INFO] [stdout] | [INFO] [stdout] 424 | std::slice::from_raw_parts_mut(ptr as *mut T, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:418:5 [INFO] [stdout] | [INFO] [stdout] 418 | pub unsafe fn from_glib_borrow_num_mut<'a>(ptr: *mut T::GlibType, len: usize) -> &'a mut [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:440:13 [INFO] [stdout] | [INFO] [stdout] 440 | std::slice::from_raw_parts(ptr as *const &T, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:431:5 [INFO] [stdout] | [INFO] [stdout] 431 | / pub unsafe fn from_glib_ptr_borrow_num<'a>( [INFO] [stdout] 432 | | ptr: *const *const T::GlibType, [INFO] [stdout] 433 | | len: usize, [INFO] [stdout] 434 | | ) -> &'a [&'a T] { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:456:13 [INFO] [stdout] | [INFO] [stdout] 456 | std::slice::from_raw_parts_mut(ptr as *mut &mut T, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:447:5 [INFO] [stdout] | [INFO] [stdout] 447 | / pub unsafe fn from_glib_ptr_borrow_num_mut<'a>( [INFO] [stdout] 448 | | ptr: *mut *mut T::GlibType, [INFO] [stdout] 449 | | len: usize, [INFO] [stdout] 450 | | ) -> &'a mut [&'a mut T] { [INFO] [stdout] | |____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_borrow_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:471:21 [INFO] [stdout] | [INFO] [stdout] 471 | let s = Self::from_glib_borrow_num(ptr, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:463:5 [INFO] [stdout] | [INFO] [stdout] 463 | pub unsafe fn from_glib_none_num(ptr: *const T::GlibType, len: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:484:13 [INFO] [stdout] | [INFO] [stdout] 484 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:479:5 [INFO] [stdout] | [INFO] [stdout] 479 | pub unsafe fn from_glib_container_num(ptr: *mut T::GlibType, len: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:491:29 [INFO] [stdout] | [INFO] [stdout] 491 | let p = ptr.add(i) as *mut T; [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:492:36 [INFO] [stdout] | [INFO] [stdout] 492 | let clone: T = (*p).clone(); [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:493:21 [INFO] [stdout] | [INFO] [stdout] 493 | ptr::write(p, clone); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:498:13 [INFO] [stdout] | [INFO] [stdout] 498 | Self::from_glib_full_num(ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:510:13 [INFO] [stdout] | [INFO] [stdout] 510 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:505:5 [INFO] [stdout] | [INFO] [stdout] 505 | pub unsafe fn from_glib_full_num(ptr: *mut T::GlibType, len: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:514:22 [INFO] [stdout] | [INFO] [stdout] 514 | ptr: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:799:9 [INFO] [stdout] | [INFO] [stdout] 799 | Self::from_glib_none_num(ptr, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:798:5 [INFO] [stdout] | [INFO] [stdout] 798 | unsafe fn from_glib_none_num(ptr: *mut T::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_container_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:804:9 [INFO] [stdout] | [INFO] [stdout] 804 | Self::from_glib_container_num(ptr, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:803:5 [INFO] [stdout] | [INFO] [stdout] 803 | unsafe fn from_glib_container_num(ptr: *mut T::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:809:9 [INFO] [stdout] | [INFO] [stdout] 809 | Self::from_glib_full_num(ptr, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:808:5 [INFO] [stdout] | [INFO] [stdout] 808 | unsafe fn from_glib_full_num(ptr: *mut T::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slice::Slice::::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slice.rs:815:9 [INFO] [stdout] | [INFO] [stdout] 815 | Self::from_glib_none_num(ptr, num) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slice.rs:814:5 [INFO] [stdout] | [INFO] [stdout] 814 | unsafe fn from_glib_none_num(ptr: *const T::GlibType, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_list_copy_deep` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | ffi::g_list_copy_deep(mut_override(list), Some(copy_item::), ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn from_glib_none(list: *const ffi::GList) -> List { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_list_copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:49:13 [INFO] [stdout] | [INFO] [stdout] 49 | ffi::g_list_copy(mut_override(list)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:41:21 [INFO] [stdout] | [INFO] [stdout] 41 | (*(&ptr as *const ffi::gconstpointer as *const T)).clone(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:36:13 [INFO] [stdout] | [INFO] [stdout] 36 | / unsafe extern "C" fn copy_item( [INFO] [stdout] 37 | | ptr: ffi::gconstpointer, [INFO] [stdout] 38 | | _user_data: ffi::gpointer, [INFO] [stdout] 39 | | ) -> ffi::gpointer { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:44:17 [INFO] [stdout] | [INFO] [stdout] 44 | *(&mut *item as *mut T as *mut *mut T::GlibType) as ffi::gpointer [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_list_foreach` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:72:13 [INFO] [stdout] | [INFO] [stdout] 72 | ffi::g_list_foreach(list, Some(copy_item::), ptr::null_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:61:5 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn from_glib_container(list: *mut ffi::GList) -> List { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:68:28 [INFO] [stdout] | [INFO] [stdout] 68 | let item = (*(&ptr as *const ffi::gpointer as *const T)).clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:64:13 [INFO] [stdout] | [INFO] [stdout] 64 | / unsafe extern "C" fn copy_item( [INFO] [stdout] 65 | | ptr: ffi::gpointer, [INFO] [stdout] 66 | | _user_data: ffi::gpointer, [INFO] [stdout] 67 | | ) { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:69:17 [INFO] [stdout] | [INFO] [stdout] 69 | ptr::write(ptr as *mut T, item); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:329:30 [INFO] [stdout] | [INFO] [stdout] 329 | let f = &mut *(user_data as *mut F); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:321:13 [INFO] [stdout] | [INFO] [stdout] 321 | / unsafe extern "C" fn func< [INFO] [stdout] 322 | | T: TransparentPtrType, [INFO] [stdout] 323 | | F: FnMut(&T, &T) -> std::cmp::Ordering, [INFO] [stdout] 324 | | >( [INFO] [stdout] ... | [INFO] [stdout] 327 | | user_data: ffi::gpointer, [INFO] [stdout] 328 | | ) -> i32 { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:330:26 [INFO] [stdout] | [INFO] [stdout] 330 | let a = &*(&a as *const ffi::gconstpointer as *const T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:331:26 [INFO] [stdout] | [INFO] [stdout] 331 | let b = &*(&b as *const ffi::gconstpointer as *const T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:414:25 [INFO] [stdout] | [INFO] [stdout] 414 | ptr::drop_in_place(&mut ptr as *mut ffi::gpointer as *mut T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:413:21 [INFO] [stdout] | [INFO] [stdout] 413 | unsafe extern "C" fn drop_item(mut ptr: ffi::gpointer) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:513:9 [INFO] [stdout] | [INFO] [stdout] 513 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:512:5 [INFO] [stdout] | [INFO] [stdout] 512 | unsafe fn from_glib_none_num(ptr: *mut ffi::GList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:518:9 [INFO] [stdout] | [INFO] [stdout] 518 | Self::from_glib_container(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:517:5 [INFO] [stdout] | [INFO] [stdout] 517 | unsafe fn from_glib_container_num(ptr: *mut ffi::GList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:523:9 [INFO] [stdout] | [INFO] [stdout] 523 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:522:5 [INFO] [stdout] | [INFO] [stdout] 522 | unsafe fn from_glib_full_num(ptr: *mut ffi::GList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:532:9 [INFO] [stdout] | [INFO] [stdout] 532 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:531:5 [INFO] [stdout] | [INFO] [stdout] 531 | unsafe fn from_glib_none_num(ptr: *const ffi::GList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:549:9 [INFO] [stdout] | [INFO] [stdout] 549 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:548:5 [INFO] [stdout] | [INFO] [stdout] 548 | unsafe fn from_glib_none(ptr: *mut ffi::GList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:554:9 [INFO] [stdout] | [INFO] [stdout] 554 | Self::from_glib_container(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:553:5 [INFO] [stdout] | [INFO] [stdout] 553 | unsafe fn from_glib_container(ptr: *mut ffi::GList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:559:9 [INFO] [stdout] | [INFO] [stdout] 559 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:558:5 [INFO] [stdout] | [INFO] [stdout] 558 | unsafe fn from_glib_full(ptr: *mut ffi::GList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::list::List::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/list.rs:568:9 [INFO] [stdout] | [INFO] [stdout] 568 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/list.rs:567:5 [INFO] [stdout] | [INFO] [stdout] 567 | unsafe fn from_glib_none(ptr: *const ffi::GList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_slist_copy_deep` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:47:13 [INFO] [stdout] | [INFO] [stdout] 47 | ffi::g_slist_copy_deep(mut_override(list), Some(copy_item::), ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn from_glib_none(list: *const ffi::GSList) -> SList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_slist_copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:49:13 [INFO] [stdout] | [INFO] [stdout] 49 | ffi::g_slist_copy(mut_override(list)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:41:21 [INFO] [stdout] | [INFO] [stdout] 41 | (*(&ptr as *const ffi::gconstpointer as *const T)).clone(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:36:13 [INFO] [stdout] | [INFO] [stdout] 36 | / unsafe extern "C" fn copy_item( [INFO] [stdout] 37 | | ptr: ffi::gconstpointer, [INFO] [stdout] 38 | | _user_data: ffi::gpointer, [INFO] [stdout] 39 | | ) -> ffi::gpointer { [INFO] [stdout] | |______________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:44:17 [INFO] [stdout] | [INFO] [stdout] 44 | *(&mut *item as *mut T as *mut *mut T::GlibType) as ffi::gpointer [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_slist_foreach` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:72:13 [INFO] [stdout] | [INFO] [stdout] 72 | ffi::g_slist_foreach(list, Some(copy_item::), ptr::null_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:61:5 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn from_glib_container(list: *mut ffi::GSList) -> SList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:68:28 [INFO] [stdout] | [INFO] [stdout] 68 | let item = (*(&ptr as *const ffi::gpointer as *const T)).clone(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:64:13 [INFO] [stdout] | [INFO] [stdout] 64 | / unsafe extern "C" fn copy_item( [INFO] [stdout] 65 | | ptr: ffi::gpointer, [INFO] [stdout] 66 | | _user_data: ffi::gpointer, [INFO] [stdout] 67 | | ) { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:69:17 [INFO] [stdout] | [INFO] [stdout] 69 | ptr::write(ptr as *mut T, item); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:324:30 [INFO] [stdout] | [INFO] [stdout] 324 | let f = &mut *(user_data as *mut F); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:316:13 [INFO] [stdout] | [INFO] [stdout] 316 | / unsafe extern "C" fn func< [INFO] [stdout] 317 | | T: TransparentPtrType, [INFO] [stdout] 318 | | F: FnMut(&T, &T) -> std::cmp::Ordering, [INFO] [stdout] 319 | | >( [INFO] [stdout] ... | [INFO] [stdout] 322 | | user_data: ffi::gpointer, [INFO] [stdout] 323 | | ) -> i32 { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:325:26 [INFO] [stdout] | [INFO] [stdout] 325 | let a = &*(&a as *const ffi::gconstpointer as *const T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:326:26 [INFO] [stdout] | [INFO] [stdout] 326 | let b = &*(&b as *const ffi::gconstpointer as *const T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:409:25 [INFO] [stdout] | [INFO] [stdout] 409 | ptr::drop_in_place(&mut ptr as *mut ffi::gpointer as *mut T); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:408:21 [INFO] [stdout] | [INFO] [stdout] 408 | unsafe extern "C" fn drop_item(mut ptr: ffi::gpointer) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:507:9 [INFO] [stdout] | [INFO] [stdout] 507 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:506:5 [INFO] [stdout] | [INFO] [stdout] 506 | unsafe fn from_glib_none_num(ptr: *mut ffi::GSList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:512:9 [INFO] [stdout] | [INFO] [stdout] 512 | Self::from_glib_container(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:511:5 [INFO] [stdout] | [INFO] [stdout] 511 | unsafe fn from_glib_container_num(ptr: *mut ffi::GSList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:517:9 [INFO] [stdout] | [INFO] [stdout] 517 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:516:5 [INFO] [stdout] | [INFO] [stdout] 516 | unsafe fn from_glib_full_num(ptr: *mut ffi::GSList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:526:9 [INFO] [stdout] | [INFO] [stdout] 526 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:525:5 [INFO] [stdout] | [INFO] [stdout] 525 | unsafe fn from_glib_none_num(ptr: *const ffi::GSList, _num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:543:9 [INFO] [stdout] | [INFO] [stdout] 543 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:542:5 [INFO] [stdout] | [INFO] [stdout] 542 | unsafe fn from_glib_none(ptr: *mut ffi::GSList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:548:9 [INFO] [stdout] | [INFO] [stdout] 548 | Self::from_glib_container(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:547:5 [INFO] [stdout] | [INFO] [stdout] 547 | unsafe fn from_glib_container(ptr: *mut ffi::GSList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:553:9 [INFO] [stdout] | [INFO] [stdout] 553 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:552:5 [INFO] [stdout] | [INFO] [stdout] 552 | unsafe fn from_glib_full(ptr: *mut ffi::GSList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::slist::SList::::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/slist.rs:562:9 [INFO] [stdout] | [INFO] [stdout] 562 | Self::from_glib_none(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/slist.rs:561:5 [INFO] [stdout] | [INFO] [stdout] 561 | unsafe fn from_glib_none(ptr: *const ffi::GSList) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:444:20 [INFO] [stdout] | [INFO] [stdout] 444 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:441:5 [INFO] [stdout] | [INFO] [stdout] 441 | pub unsafe fn from_glib_borrow<'a>(ptr: *const *const c_char) -> &'a [GStringPtr] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:444:22 [INFO] [stdout] | [INFO] [stdout] 444 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_borrow_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:448:9 [INFO] [stdout] | [INFO] [stdout] 448 | Self::from_glib_borrow_num(ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:463:13 [INFO] [stdout] | [INFO] [stdout] 463 | std::slice::from_raw_parts(ptr as *const GStringPtr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:454:5 [INFO] [stdout] | [INFO] [stdout] 454 | / pub unsafe fn from_glib_borrow_num<'a>( [INFO] [stdout] 455 | | ptr: *const *const c_char, [INFO] [stdout] 456 | | len: usize, [INFO] [stdout] 457 | | ) -> &'a [GStringPtr] { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_malloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:483:17 [INFO] [stdout] | [INFO] [stdout] 483 | ffi::g_malloc(mem::size_of::<*mut c_char>() * (len + 1)) as *mut *mut c_char; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:470:5 [INFO] [stdout] | [INFO] [stdout] 470 | / pub unsafe fn from_glib_none_num( [INFO] [stdout] 471 | | ptr: *const *const c_char, [INFO] [stdout] 472 | | len: usize, [INFO] [stdout] 473 | | _null_terminated: bool, [INFO] [stdout] 474 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:487:25 [INFO] [stdout] | [INFO] [stdout] 487 | let p = ptr.add(i) as *mut *const c_char; [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:488:25 [INFO] [stdout] | [INFO] [stdout] 488 | let q = new_ptr.add(i) as *mut *const c_char; [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:489:17 [INFO] [stdout] | [INFO] [stdout] 489 | *q = ffi::g_strdup(*p); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_strdup` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:489:22 [INFO] [stdout] | [INFO] [stdout] 489 | *q = ffi::g_strdup(*p); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:489:36 [INFO] [stdout] | [INFO] [stdout] 489 | *q = ffi::g_strdup(*p); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:492:13 [INFO] [stdout] | [INFO] [stdout] 492 | *new_ptr.add(len) = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:492:14 [INFO] [stdout] | [INFO] [stdout] 492 | *new_ptr.add(len) = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:495:22 [INFO] [stdout] | [INFO] [stdout] 495 | ptr: ptr::NonNull::new_unchecked(new_ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:513:13 [INFO] [stdout] | [INFO] [stdout] 513 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:505:5 [INFO] [stdout] | [INFO] [stdout] 505 | / pub unsafe fn from_glib_container_num( [INFO] [stdout] 506 | | ptr: *mut *const c_char, [INFO] [stdout] 507 | | len: usize, [INFO] [stdout] 508 | | null_terminated: bool, [INFO] [stdout] 509 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:518:25 [INFO] [stdout] | [INFO] [stdout] 518 | let p = ptr.add(i); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:519:17 [INFO] [stdout] | [INFO] [stdout] 519 | *p = ffi::g_strdup(*p); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_strdup` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:519:22 [INFO] [stdout] | [INFO] [stdout] 519 | *p = ffi::g_strdup(*p); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:519:36 [INFO] [stdout] | [INFO] [stdout] 519 | *p = ffi::g_strdup(*p); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:523:13 [INFO] [stdout] | [INFO] [stdout] 523 | Self::from_glib_full_num(ptr as *mut *mut c_char, len, null_terminated) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_free` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:538:13 [INFO] [stdout] | [INFO] [stdout] 538 | ffi::g_free(ptr as ffi::gpointer); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:530:5 [INFO] [stdout] | [INFO] [stdout] 530 | / pub unsafe fn from_glib_full_num( [INFO] [stdout] 531 | | ptr: *mut *mut c_char, [INFO] [stdout] 532 | | len: usize, [INFO] [stdout] 533 | | null_terminated: bool, [INFO] [stdout] 534 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:543:26 [INFO] [stdout] | [INFO] [stdout] 543 | ptr: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `glib_sys::g_realloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:552:23 [INFO] [stdout] | [INFO] [stdout] 552 | let ptr = ffi::g_realloc( [INFO] [stdout] | _______________________^ [INFO] [stdout] 553 | | ptr as *mut _, [INFO] [stdout] 554 | | mem::size_of::<*mut c_char>().checked_mul(capacity).unwrap(), [INFO] [stdout] 555 | | ) as *mut *mut c_char; [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:556:13 [INFO] [stdout] | [INFO] [stdout] 556 | *ptr.add(len) = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:556:14 [INFO] [stdout] | [INFO] [stdout] 556 | *ptr.add(len) = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:559:22 [INFO] [stdout] | [INFO] [stdout] 559 | ptr: ptr::NonNull::new_unchecked(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:572:20 [INFO] [stdout] | [INFO] [stdout] 572 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:569:5 [INFO] [stdout] | [INFO] [stdout] 569 | pub unsafe fn from_glib_none(ptr: *const *const c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:572:22 [INFO] [stdout] | [INFO] [stdout] 572 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:577:9 [INFO] [stdout] | [INFO] [stdout] 577 | StrV::from_glib_none_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:586:20 [INFO] [stdout] | [INFO] [stdout] 586 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:583:5 [INFO] [stdout] | [INFO] [stdout] 583 | pub unsafe fn from_glib_container(ptr: *mut *const c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:586:22 [INFO] [stdout] | [INFO] [stdout] 586 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_container_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:591:9 [INFO] [stdout] | [INFO] [stdout] 591 | StrV::from_glib_container_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:600:20 [INFO] [stdout] | [INFO] [stdout] 600 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:597:5 [INFO] [stdout] | [INFO] [stdout] 597 | pub unsafe fn from_glib_full(ptr: *mut *mut c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:600:22 [INFO] [stdout] | [INFO] [stdout] 600 | while !(*ptr.add(len)).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:605:9 [INFO] [stdout] | [INFO] [stdout] 605 | StrV::from_glib_full_num(ptr, len, true) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:918:9 [INFO] [stdout] | [INFO] [stdout] 918 | Self::from_glib_none_num(ptr as *const *const c_char, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:917:5 [INFO] [stdout] | [INFO] [stdout] 917 | unsafe fn from_glib_none_num(ptr: *mut *mut c_char, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_container_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:923:9 [INFO] [stdout] | [INFO] [stdout] 923 | Self::from_glib_container_num(ptr as *mut *const c_char, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:922:5 [INFO] [stdout] | [INFO] [stdout] 922 | unsafe fn from_glib_container_num(ptr: *mut *mut c_char, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_full_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:928:9 [INFO] [stdout] | [INFO] [stdout] 928 | Self::from_glib_full_num(ptr, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:927:5 [INFO] [stdout] | [INFO] [stdout] 927 | unsafe fn from_glib_full_num(ptr: *mut *mut c_char, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_none_num` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:934:9 [INFO] [stdout] | [INFO] [stdout] 934 | Self::from_glib_none_num(ptr as *const *const c_char, num, false) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:933:5 [INFO] [stdout] | [INFO] [stdout] 933 | unsafe fn from_glib_none_num(ptr: *const *mut c_char, num: usize) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:949:9 [INFO] [stdout] | [INFO] [stdout] 949 | Self::from_glib_none(ptr as *const *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:948:5 [INFO] [stdout] | [INFO] [stdout] 948 | unsafe fn from_glib_none(ptr: *mut *mut c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_container` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:954:9 [INFO] [stdout] | [INFO] [stdout] 954 | Self::from_glib_container(ptr as *mut *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:953:5 [INFO] [stdout] | [INFO] [stdout] 953 | unsafe fn from_glib_container(ptr: *mut *mut c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:959:9 [INFO] [stdout] | [INFO] [stdout] 959 | Self::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:958:5 [INFO] [stdout] | [INFO] [stdout] 958 | unsafe fn from_glib_full(ptr: *mut *mut c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:966:9 [INFO] [stdout] | [INFO] [stdout] 966 | Self::from_glib_none(ptr as *const *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:965:5 [INFO] [stdout] | [INFO] [stdout] 965 | unsafe fn from_glib_none(ptr: *const *mut c_char) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_dup_boxed` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:1040:19 [INFO] [stdout] | [INFO] [stdout] 1040 | let ptr = gobject_ffi::g_value_dup_boxed(value.to_glib_none().0) as *mut *mut c_char; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:1039:5 [INFO] [stdout] | [INFO] [stdout] 1039 | unsafe fn from_value(value: &'a crate::value::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::FromGlibPtrContainer::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:1041:9 [INFO] [stdout] | [INFO] [stdout] 1041 | FromGlibPtrContainer::from_glib_full(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `gobject_sys::g_value_get_boxed` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:1049:19 [INFO] [stdout] | [INFO] [stdout] 1049 | let ptr = gobject_ffi::g_value_get_boxed(value.to_glib_none().0) as *const *const c_char; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/collections/strv.rs:1048:5 [INFO] [stdout] | [INFO] [stdout] 1048 | unsafe fn from_value(value: &'a crate::value::Value) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `collections::strv::StrV::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/collections/strv.rs:1050:9 [INFO] [stdout] | [INFO] [stdout] 1050 | StrV::from_glib_borrow(ptr) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:56:18 [INFO] [stdout] | [INFO] [stdout] 56 | &*(ptr as *const *mut $ffi_name as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:50:13 [INFO] [stdout] | [INFO] [stdout] 50 | pub unsafe fn from_glib_ptr_borrow(ptr: &*mut $ffi_name) -> &Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:67:22 [INFO] [stdout] | [INFO] [stdout] 67 | &mut *(ptr as *mut *mut $ffi_name as *mut Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:61:13 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn from_glib_ptr_borrow_mut(ptr: &mut *mut $ffi_name) -> &mut Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:200:28 [INFO] [stdout] | [INFO] [stdout] 200 | inner: $crate::translate::from_glib_none(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:198:13 [INFO] [stdout] | [INFO] [stdout] 198 | unsafe fn from_glib_none(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_none` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:210:28 [INFO] [stdout] | [INFO] [stdout] 210 | inner: $crate::translate::from_glib_none(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:208:13 [INFO] [stdout] | [INFO] [stdout] 208 | unsafe fn from_glib_none(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:220:28 [INFO] [stdout] | [INFO] [stdout] 220 | inner: $crate::translate::from_glib_full(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | unsafe fn from_glib_full(ptr: *mut $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_full` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:230:28 [INFO] [stdout] | [INFO] [stdout] 230 | inner: $crate::translate::from_glib_full(ptr), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:228:13 [INFO] [stdout] | [INFO] [stdout] 228 | unsafe fn from_glib_full(ptr: *const $ffi_name) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::Borrowed::::into_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:241:32 [INFO] [stdout] | [INFO] [stdout] 241 | inner: $crate::translate::from_glib_borrow::<_, $crate::boxed::Boxed<_, _>>(ptr).into_inner(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:238:13 [INFO] [stdout] | [INFO] [stdout] 238 | unsafe fn from_glib_borrow(ptr: *mut $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:241:32 [INFO] [stdout] | [INFO] [stdout] 241 | inner: $crate::translate::from_glib_borrow::<_, $crate::boxed::Boxed<_, _>>(ptr).into_inner(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `translate::from_glib_borrow` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:251:17 [INFO] [stdout] | [INFO] [stdout] 251 | $crate::translate::from_glib_borrow::<_, Self>(ptr as *mut $ffi_name) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:250:13 [INFO] [stdout] | [INFO] [stdout] 250 | unsafe fn from_glib_borrow(ptr: *const $ffi_name) -> $crate::translate::Borrowed { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:21 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/boxed.rs:257:13 [INFO] [stdout] | [INFO] [stdout] 257 | unsafe fn from_glib_none_num_as_vec(ptr: *mut *mut $ffi_name, num: usize) -> Vec { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `$crate::glib_boxed_wrapper` which comes from the expansion of the macro `crate::wrapper` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/boxed.rs:265:39 [INFO] [stdout] | [INFO] [stdout] 265 | ::std::ptr::write(res_ptr.add(i), $crate::translate::from_glib_none(std::ptr::read(ptr.add(i)))); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/auto/checksum.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / crate::wrapper! { [INFO] [stdout] 8 | | #[derive(Debug, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 9 | | pub struct Checksum(Boxed); [INFO] [stdout] ... | [INFO] [stdout] 15 | | } [INFO] [stdout] 16 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [WARN] too many lines in the log, truncating it