[INFO] fetching crate hvm-core 0.3.0-hvm32.compat.4... [INFO] checking hvm-core-0.3.0-hvm32.compat.4 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate hvm-core 0.3.0-hvm32.compat.4 into /workspace/builds/worker-5-tc2/source [INFO] validating manifest of crates.io crate hvm-core 0.3.0-hvm32.compat.4 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] removed /workspace/builds/worker-5-tc2/source/rust-toolchain.toml [INFO] started tweaking crates.io crate hvm-core 0.3.0-hvm32.compat.4 [INFO] finished tweaking crates.io crate hvm-core 0.3.0-hvm32.compat.4 [INFO] tweaked toml for crates.io crate hvm-core 0.3.0-hvm32.compat.4 written to /workspace/builds/worker-5-tc2/source/Cargo.toml [INFO] crate crates.io crate hvm-core 0.3.0-hvm32.compat.4 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 5a5efb31a0f4e57464dd7b975c47106f20bd2f14eaca35bea3f740947e97604d [INFO] running `Command { std: "docker" "start" "-a" "5a5efb31a0f4e57464dd7b975c47106f20bd2f14eaca35bea3f740947e97604d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "5a5efb31a0f4e57464dd7b975c47106f20bd2f14eaca35bea3f740947e97604d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5a5efb31a0f4e57464dd7b975c47106f20bd2f14eaca35bea3f740947e97604d", kill_on_drop: false }` [INFO] [stdout] 5a5efb31a0f4e57464dd7b975c47106f20bd2f14eaca35bea3f740947e97604d [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 1a2c753ed7e5a4961cc1890bbae0b7c89083844b91a39c4adfdf0d976e61d8f7 [INFO] running `Command { std: "docker" "start" "-a" "1a2c753ed7e5a4961cc1890bbae0b7c89083844b91a39c4adfdf0d976e61d8f7", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling proc-macro2 v1.0.82 [INFO] [stderr] Compiling libc v0.2.154 [INFO] [stderr] Checking memchr v2.7.2 [INFO] [stderr] Compiling cc v1.0.97 [INFO] [stderr] Checking futures-core v0.3.30 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Checking futures-sink v0.3.30 [INFO] [stderr] Compiling thiserror v1.0.60 [INFO] [stderr] Checking highlight_error v0.1.1 [INFO] [stderr] Checking log v0.4.21 [INFO] [stderr] Checking regex-syntax v0.8.3 [INFO] [stderr] Checking nohash-hasher v0.2.0 [INFO] [stderr] Checking sdd v0.2.0 [INFO] [stderr] Checking arrayvec v0.7.4 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking linked-hash-map v0.5.6 [INFO] [stderr] Checking similar v2.5.0 [INFO] [stderr] Checking TSPL v0.0.9 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Checking scc v2.1.1 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking bstr v1.9.1 [INFO] [stderr] Compiling quote v1.0.36 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking console v0.15.8 [INFO] [stderr] Compiling syn v2.0.63 [INFO] [stderr] Compiling psm v0.1.21 [INFO] [stderr] Compiling stacker v0.1.15 [INFO] [stderr] Checking parking_lot v0.12.2 [INFO] [stderr] Checking regex-automata v0.4.6 [INFO] [stderr] Checking globset v0.4.14 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Checking futures v0.3.30 [INFO] [stderr] Checking insta v1.39.0 [INFO] [stderr] Compiling clap_derive v4.5.4 [INFO] [stderr] Compiling thiserror-impl v1.0.60 [INFO] [stderr] Compiling serial_test_derive v3.1.1 [INFO] [stderr] Checking serial_test v3.1.1 [INFO] [stderr] Checking clap v4.5.4 [INFO] [stderr] Checking hvm-core v0.3.0-hvm32.compat.4 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `hvmc` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/compile.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/run/dyn_net.rs [INFO] [stderr] * src/run/interact.rs [INFO] [stderr] * src/run/net.rs [INFO] [stderr] * src/trace.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:53:15 [INFO] [stderr] | [INFO] [stderr] 53 | ($pat:pat = $expr:expr_2021 => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:53:34 [INFO] [stderr] | [INFO] [stderr] 53 | ($pat:pat = $expr:expr_2021 => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:59:18 [INFO] [stderr] | [INFO] [stderr] 59 | ($net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:62:22 [INFO] [stderr] | [INFO] [stderr] 62 | (mut $net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:65:19 [INFO] [stderr] | [INFO] [stderr] 65 | (&$net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:68:23 [INFO] [stderr] | [INFO] [stderr] 68 | (&mut $net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:94:4 [INFO] [stderr] | [INFO] [stderr] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:94:40 [INFO] [stderr] | [INFO] [stderr] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:112:4 [INFO] [stderr] | [INFO] [stderr] 112 | ($tracer:expr_2021 $(, $x:expr_2021)* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:112:26 [INFO] [stderr] | [INFO] [stderr] 112 | ($tracer:expr_2021 $(, $x:expr_2021)* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:1:41 [INFO] [stderr] | [INFO] [stderr] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(stable_features)]` on by default [INFO] [stderr] [INFO] [stderr] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:1:76 [INFO] [stderr] | [INFO] [stderr] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `host` [INFO] [stderr] --> src/compile.rs:14:21 [INFO] [stderr] | [INFO] [stderr] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `a` [INFO] [stderr] --> src/run/interact.rs:6:30 [INFO] [stderr] | [INFO] [stderr] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stderr] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `b` [INFO] [stderr] --> src/run/interact.rs:6:39 [INFO] [stderr] | [INFO] [stderr] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stderr] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/run/net.rs:155:57 [INFO] [stderr] | [INFO] [stderr] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 155 | return net.call(port, Port::new_ref(Def::upcast(unsafe { &*def }))); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] error: aborting due to 10 previous errors; 6 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/lib.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | pub mod gen; [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/run/def.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 95 | | /// An internal type used to mark dynamic `Def`s. [INFO] [stdout] 96 | | /// [INFO] [stdout] 97 | | /// Because this is an `extern type`, it is unsized, but has zero metadata. [INFO] [stdout] ... | [INFO] [stdout] 100 | | pub type Dynamic; [INFO] [stdout] 101 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:53:21 [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr_2021 => $body:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:53:35 [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:59:24 [INFO] [stdout] | [INFO] [stdout] 59 | ($net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 59 | ($net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:62:28 [INFO] [stdout] | [INFO] [stdout] 62 | (mut $net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 62 | (mut $net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:65:25 [INFO] [stdout] | [INFO] [stdout] 65 | (&$net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 65 | (&$net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:68:29 [INFO] [stdout] | [INFO] [stdout] 68 | (&mut $net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 68 | (&mut $net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:94:12 [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:94:38 [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:112:12 [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr_2021 $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:112:24 [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr_2021)* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:41 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:76 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `host` [INFO] [stdout] --> src/compile.rs:14:21 [INFO] [stdout] | [INFO] [stdout] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:132:8 [INFO] [stdout] | [INFO] [stdout] 132 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | pub unsafe fn downcast_ptr(slf: *const Def) -> Option<*const Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:136:8 [INFO] [stdout] | [INFO] [stdout] 136 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe fn downcast_mut_ptr(slf: *mut Def) -> Option<*mut Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:33 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | pub unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:34 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:31 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:32 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:175:34 [INFO] [stdout] | [INFO] [stdout] 175 | DynNetMut::Strict(net) => ((*slf).data.0)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:173:3 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:176:32 [INFO] [stdout] | [INFO] [stdout] 176 | DynNetMut::Lazy(net) => ((*slf).data.1)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `a` [INFO] [stdout] --> src/run/interact.rs:6:30 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/run/interact.rs:6:39 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `run::def::Def::downcast_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:150:28 [INFO] [stdout] | [INFO] [stdout] 150 | if let Some(other) = Def::downcast_ptr::(other) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/net.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:151:20 [INFO] [stdout] | [INFO] [stdout] 151 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:152:22 [INFO] [stdout] | [INFO] [stdout] 152 | let other = *Box::from_raw(other as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:158:16 [INFO] [stdout] | [INFO] [stdout] 158 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `stdlib::HostedDef::::new_hosted` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | HostedDef::new_hosted(LabSet::ALL, LogDef(host, f)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:37:3 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn new(host: Arc>, f: F) -> DefRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:102:13 [INFO] [stdout] | [INFO] [stdout] 102 | T::call(Box::from_raw(slf as *mut _), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | T::call(Arc::from_raw(slf as *mut _), net, port); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:155:13 [INFO] [stdout] | [INFO] [stdout] 155 | T::call((slf as *const Def).as_ref().unwrap(), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:154:3 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | Box::from_raw(self.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:167:3 [INFO] [stdout] | [INFO] [stdout] 167 | unsafe fn to_box(self) -> Box { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_def` is never used [INFO] [stdout] --> src/compile.rs:57:4 [INFO] [stdout] | [INFO] [stdout] 57 | fn compile_def(code: &mut String, host: &Host, name: &str, instr: &[Instruction]) -> fmt::Result { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_port` is never used [INFO] [stdout] --> src/compile.rs:92:4 [INFO] [stdout] | [INFO] [stdout] 92 | fn compile_port(host: &Host, port: &Port) -> String { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `sanitize_name` is never used [INFO] [stdout] --> src/compile.rs:106:4 [INFO] [stdout] | [INFO] [stdout] 106 | fn sanitize_name(name: &str) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_lab_set` is never used [INFO] [stdout] --> src/compile.rs:121:4 [INFO] [stdout] | [INFO] [stdout] 121 | fn compile_lab_set(labs: &LabSet) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: trait `Num` is never used [INFO] [stdout] --> src/ops.rs:4:7 [INFO] [stdout] | [INFO] [stdout] 4 | trait Num: Eq + Ord + Sized { [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/stdlib.rs:201:12 [INFO] [stdout] | [INFO] [stdout] 201 | if let Some(other) = unsafe { BoxDef::::try_downcast_box(port.clone()) } { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^--------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 209 | } else if let Some(back) = def.data.host.lock().back.get(&port.addr()) { [INFO] [stdout] | -------------------- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/stdlib.rs:209:9 [INFO] [stdout] | [INFO] [stdout] 209 | } else if let Some(back) = def.data.host.lock().back.get(&port.addr()) { [INFO] [stdout] | ^ [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/stdlib.rs:211:9 [INFO] [stdout] | [INFO] [stdout] 211 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 201 ~ match unsafe { BoxDef::::try_downcast_box(port.clone()) } { Some(other) => { [INFO] [stdout] 202 | let var = def.data.var_idx.fetch_add(1, Ordering::AcqRel); [INFO] [stdout] ... [INFO] [stdout] 208 | Self::maybe_finish(DynNetMut::from(&mut *net), other.data.0.root); [INFO] [stdout] 209 ~ } _ => { match def.data.host.lock().back.get(&port.addr()) { Some(back) => { [INFO] [stdout] 210 | unsafe { *(def.data.tree.0) = Tree::Ref { nam: back.clone() } }; [INFO] [stdout] 211 ~ } _ => { [INFO] [stdout] 212 | unsafe { *(def.data.tree.0) = Tree::Era }; [INFO] [stdout] 213 ~ }}}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/transform/inline.rs:68:10 [INFO] [stdout] | [INFO] [stdout] 68 | if let Some(inlined) = self.inlinees.get(nam) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^-------------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/transform/inline.rs:71:7 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 68 ~ match self.inlinees.get(nam) { Some(inlined) => { [INFO] [stdout] 69 | *tree = inlined.clone(); [INFO] [stdout] 70 | true [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | false [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/transform/pre_reduce.rs:69:10 [INFO] [stdout] | [INFO] [stdout] 69 | if let SeenState::Reduced { net, normal } = state { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/transform/pre_reduce.rs:74:7 [INFO] [stdout] | [INFO] [stdout] 74 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 69 ~ match state { SeenState::Reduced { net, normal } => { [INFO] [stdout] 70 | if !normal { [INFO] [stdout] ... [INFO] [stdout] 73 | self.nets.insert(nam, net); [INFO] [stdout] 74 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 44 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating src/main.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `hvmc` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/compile.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/run/dyn_net.rs [INFO] [stderr] * src/run/interact.rs [INFO] [stderr] * src/run/net.rs [INFO] [stderr] * src/trace.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:53:15 [INFO] [stderr] | [INFO] [stderr] 53 | ($pat:pat = $expr:expr_2021 => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:53:34 [INFO] [stderr] | [INFO] [stderr] 53 | ($pat:pat = $expr:expr_2021 => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:59:18 [INFO] [stderr] | [INFO] [stderr] 59 | ($net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:62:22 [INFO] [stderr] | [INFO] [stderr] 62 | (mut $net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:65:19 [INFO] [stderr] | [INFO] [stderr] 65 | (&$net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/run/dyn_net.rs:68:23 [INFO] [stderr] | [INFO] [stderr] 68 | (&mut $net:ident => $body:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:94:4 [INFO] [stderr] | [INFO] [stderr] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/lib.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | pub mod gen; [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/run/def.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 95 | | /// An internal type used to mark dynamic `Def`s. [INFO] [stdout] 96 | | /// [INFO] [stdout] 97 | | /// Because this is an `extern type`, it is unsized, but has zero metadata. [INFO] [stdout] ... | [INFO] [stdout] 100 | | pub type Dynamic; [INFO] [stdout] 101 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/trace.rs:94:40 [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:53:21 [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr_2021 => $body:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:53:35 [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 53 | ($pat:pat = $expr:expr => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/trace.rs:112:4 [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:59:24 [INFO] [stdout] | [INFO] [stdout] 59 | ($net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 59 | ($net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:62:28 [INFO] [stdout] | [INFO] [stdout] 62 | (mut $net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 62 | (mut $net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 112 | ($tracer:expr_2021 $(, $x:expr_2021)* $(,)?) => { [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:65:25 [INFO] [stdout] | [INFO] [stdout] 65 | (&$net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 65 | (&$net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/run/dyn_net.rs:68:29 [INFO] [stdout] | [INFO] [stdout] 68 | (&mut $net:ident => $body:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 68 | (&mut $net:ident => $body:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:94:12 [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr_2021, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/trace.rs:112:26 [INFO] [stderr] | [INFO] [stderr] 112 | ($tracer:expr_2021 $(, $x:expr_2021)* $(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:94:38 [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr)* $(,)?) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 94 | ($tracer:expr, $str:literal $(, $x:expr_2021)* $(,)?) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:112:12 [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr_2021 $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:1:41 [INFO] [stderr] | [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/trace.rs:112:24 [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr)* $(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 112 | ($tracer:expr $(, $x:expr_2021)* $(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:41 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stdout] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:76 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(stable_features)]` on by default [INFO] [stderr] [INFO] [stderr] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stderr] --> src/lib.rs:1:76 [INFO] [stdout] warning: unused variable: `host` [INFO] [stdout] --> src/compile.rs:14:21 [INFO] [stdout] | [INFO] [stdout] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stderr] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: unused variable: `host` [INFO] [stderr] --> src/compile.rs:14:21 [INFO] [stderr] | [INFO] [stderr] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stderr] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `a` [INFO] [stderr] --> src/run/interact.rs:6:30 [INFO] [stderr] | [INFO] [stderr] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stderr] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stderr] [INFO] [stderr] warning: unused variable: `b` [INFO] [stderr] --> src/run/interact.rs:6:39 [INFO] [stderr] | [INFO] [stderr] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stderr] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/run/net.rs:155:57 [INFO] [stderr] | [INFO] [stderr] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 155 | return net.call(port, Port::new_ref(Def::upcast(unsafe { &*def }))); [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] error: aborting due to 10 previous errors; 6 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:132:8 [INFO] [stdout] | [INFO] [stdout] 132 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | pub unsafe fn downcast_ptr(slf: *const Def) -> Option<*const Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:136:8 [INFO] [stdout] | [INFO] [stdout] 136 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe fn downcast_mut_ptr(slf: *mut Def) -> Option<*mut Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:33 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | pub unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:34 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:31 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:32 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:175:34 [INFO] [stdout] | [INFO] [stdout] 175 | DynNetMut::Strict(net) => ((*slf).data.0)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:173:3 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:176:32 [INFO] [stdout] | [INFO] [stdout] 176 | DynNetMut::Lazy(net) => ((*slf).data.1)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `a` [INFO] [stdout] --> src/run/interact.rs:6:30 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/run/interact.rs:6:39 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `run::def::Def::downcast_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:150:28 [INFO] [stdout] | [INFO] [stdout] 150 | if let Some(other) = Def::downcast_ptr::(other) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/net.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:151:20 [INFO] [stdout] | [INFO] [stdout] 151 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:152:22 [INFO] [stdout] | [INFO] [stdout] 152 | let other = *Box::from_raw(other as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:158:16 [INFO] [stdout] | [INFO] [stdout] 158 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `stdlib::HostedDef::::new_hosted` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | HostedDef::new_hosted(LabSet::ALL, LogDef(host, f)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:37:3 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn new(host: Arc>, f: F) -> DefRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:102:13 [INFO] [stdout] | [INFO] [stdout] 102 | T::call(Box::from_raw(slf as *mut _), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | T::call(Arc::from_raw(slf as *mut _), net, port); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:155:13 [INFO] [stdout] | [INFO] [stdout] 155 | T::call((slf as *const Def).as_ref().unwrap(), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:154:3 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | Box::from_raw(self.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:167:3 [INFO] [stdout] | [INFO] [stdout] 167 | unsafe fn to_box(self) -> Box { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 61 | / bi_enum! { [INFO] [stdout] 62 | | #[repr(u8)] [INFO] [stdout] 63 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 64 | | enum Trit { [INFO] [stdout] ... | [INFO] [stdout] 68 | | } [INFO] [stdout] 69 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 61 | / bi_enum! { [INFO] [stdout] 62 | | #[repr(u8)] [INFO] [stdout] 63 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 64 | | enum Trit { [INFO] [stdout] ... | [INFO] [stdout] 68 | | } [INFO] [stdout] 69 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 74 | / bi_enum! { [INFO] [stdout] 75 | | #[repr(u8)] [INFO] [stdout] 76 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 77 | | enum Op { [INFO] [stdout] ... | [INFO] [stdout] 82 | | } [INFO] [stdout] 83 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 74 | / bi_enum! { [INFO] [stdout] 75 | | #[repr(u8)] [INFO] [stdout] 76 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 77 | | enum Op { [INFO] [stdout] ... | [INFO] [stdout] 82 | | } [INFO] [stdout] 83 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_def` is never used [INFO] [stdout] --> src/compile.rs:57:4 [INFO] [stdout] | [INFO] [stdout] 57 | fn compile_def(code: &mut String, host: &Host, name: &str, instr: &[Instruction]) -> fmt::Result { [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_port` is never used [INFO] [stdout] --> src/compile.rs:92:4 [INFO] [stdout] | [INFO] [stdout] 92 | fn compile_port(host: &Host, port: &Port) -> String { [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `sanitize_name` is never used [INFO] [stdout] --> src/compile.rs:106:4 [INFO] [stdout] | [INFO] [stdout] 106 | fn sanitize_name(name: &str) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `compile_lab_set` is never used [INFO] [stdout] --> src/compile.rs:121:4 [INFO] [stdout] | [INFO] [stdout] 121 | fn compile_lab_set(labs: &LabSet) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: trait `Num` is never used [INFO] [stdout] --> src/ops.rs:4:7 [INFO] [stdout] | [INFO] [stdout] 4 | trait Num: Eq + Ord + Sized { [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/stdlib.rs:201:12 [INFO] [stdout] | [INFO] [stdout] 201 | if let Some(other) = unsafe { BoxDef::::try_downcast_box(port.clone()) } { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^--------------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] ... [INFO] [stdout] 209 | } else if let Some(back) = def.data.host.lock().back.get(&port.addr()) { [INFO] [stdout] | -------------------- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/stdlib.rs:209:9 [INFO] [stdout] | [INFO] [stdout] 209 | } else if let Some(back) = def.data.host.lock().back.get(&port.addr()) { [INFO] [stdout] | ^ [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/stdlib.rs:211:9 [INFO] [stdout] | [INFO] [stdout] 211 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 201 ~ match unsafe { BoxDef::::try_downcast_box(port.clone()) } { Some(other) => { [INFO] [stdout] 202 | let var = def.data.var_idx.fetch_add(1, Ordering::AcqRel); [INFO] [stdout] ... [INFO] [stdout] 208 | Self::maybe_finish(DynNetMut::from(&mut *net), other.data.0.root); [INFO] [stdout] 209 ~ } _ => { match def.data.host.lock().back.get(&port.addr()) { Some(back) => { [INFO] [stdout] 210 | unsafe { *(def.data.tree.0) = Tree::Ref { nam: back.clone() } }; [INFO] [stdout] 211 ~ } _ => { [INFO] [stdout] 212 | unsafe { *(def.data.tree.0) = Tree::Era }; [INFO] [stdout] 213 ~ }}}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/transform/inline.rs:68:10 [INFO] [stdout] | [INFO] [stdout] 68 | if let Some(inlined) = self.inlinees.get(nam) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^-------------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/transform/inline.rs:71:7 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 68 ~ match self.inlinees.get(nam) { Some(inlined) => { [INFO] [stdout] 69 | *tree = inlined.clone(); [INFO] [stdout] 70 | true [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | false [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/transform/pre_reduce.rs:69:10 [INFO] [stdout] | [INFO] [stdout] 69 | if let SeenState::Reduced { net, normal } = state { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/transform/pre_reduce.rs:74:7 [INFO] [stdout] | [INFO] [stdout] 74 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 69 ~ match state { SeenState::Reduced { net, normal } => { [INFO] [stdout] 70 | if !normal { [INFO] [stdout] ... [INFO] [stdout] 73 | self.nets.insert(nam, net); [INFO] [stdout] 74 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 46 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Fixed src/main.rs (2 fixes) [INFO] [stderr] Migrating tests/fuzz.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/tests.rs from 2021 edition to 2024 [INFO] [stderr] Migrating tests/transform.rs from 2021 edition to 2024 [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:51:3 [INFO] [stdout] | [INFO] [stdout] 51 | assert_display_snapshot!(parse_and_reduce("((x y) (x y))"), @"(x x)"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating tests/cli.rs from 2021 edition to 2024 [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:52:3 [INFO] [stdout] | [INFO] [stdout] 52 | assert_display_snapshot!(parse_and_reduce("((a b c d e f) (a b c d e f))"), @"(a a)"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | assert_display_snapshot!(parse_and_reduce("<+ (a b) (a b)>"), @"<+ a a>"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | assert_display_snapshot!(parse_and_reduce("(a b) & ((a b) (c d)) ~ (c d) "), @r###" [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:58:3 [INFO] [stdout] | [INFO] [stdout] 58 | assert_display_snapshot!(parse_and_reduce("((a b) [a b])"), @"((a b) [a b])"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | assert_display_snapshot!(parse_and_reduce("((a b c) b c)"), @"((a b) b)"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:60:3 [INFO] [stdout] | [INFO] [stdout] 60 | assert_display_snapshot!(parse_and_reduce("([(a b) (c d)] [(a b) (c d)])"), @"(a a)"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:61:3 [INFO] [stdout] | [INFO] [stdout] 61 | assert_display_snapshot!(parse_and_reduce("(* *)"), @"*"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:62:3 [INFO] [stdout] | [INFO] [stdout] 62 | assert_display_snapshot!(parse_and_reduce("([(#0 #0) (#12345 #12345)] [(* *) (a a)])"), @"([#0 #12345] [* (a a)])"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:73:3 [INFO] [stdout] | [INFO] [stdout] 73 | assert_display_snapshot!(parse_and_inline(" [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:129:3 [INFO] [stdout] | [INFO] [stdout] 129 | assert_display_snapshot!(parse_and_prune(" [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `insta::assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/transform.rs:8:13 [INFO] [stdout] | [INFO] [stdout] 8 | use insta::{assert_display_snapshot, assert_snapshot}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 12 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:44:3 [INFO] [stdout] | [INFO] [stdout] 44 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating tests/lists.rs from 2021 edition to 2024 [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:49:3 [INFO] [stdout] | [INFO] [stdout] 49 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:62:3 [INFO] [stdout] | [INFO] [stdout] 62 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:71:3 [INFO] [stdout] | [INFO] [stdout] 71 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:86:3 [INFO] [stdout] | [INFO] [stdout] 86 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:95:3 [INFO] [stdout] | [INFO] [stdout] 95 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:105:3 [INFO] [stdout] | [INFO] [stdout] 105 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:121:3 [INFO] [stdout] | [INFO] [stdout] 121 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:142:3 [INFO] [stdout] | [INFO] [stdout] 142 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:168:3 [INFO] [stdout] | [INFO] [stdout] 168 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:192:3 [INFO] [stdout] | [INFO] [stdout] 192 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:221:3 [INFO] [stdout] | [INFO] [stdout] 221 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:225:3 [INFO] [stdout] | [INFO] [stdout] 225 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:229:3 [INFO] [stdout] | [INFO] [stdout] 229 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:233:3 [INFO] [stdout] | [INFO] [stdout] 233 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:237:3 [INFO] [stdout] | [INFO] [stdout] 237 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:241:3 [INFO] [stdout] | [INFO] [stdout] 241 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:245:3 [INFO] [stdout] | [INFO] [stdout] 245 | assert_display_snapshot!( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:277:3 [INFO] [stdout] | [INFO] [stdout] 277 | assert_display_snapshot!(output, @r###" [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `insta::assert_display_snapshot`: use assert_snapshot!() instead [INFO] [stdout] --> tests/cli.rs:14:12 [INFO] [stdout] | [INFO] [stdout] 14 | use insta::assert_display_snapshot; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 22 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 6.46s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking hvm-core v0.3.0-hvm32.compat.4 (/tmp/fixit) [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/lib.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | pub mod gen; [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 37 | pub mod r#gen; [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/lib.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | pub mod gen; [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 37 | pub mod r#gen; [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/run/def.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | / extern "C" { [INFO] [stdout] 95 | | /// An internal type used to mark dynamic `Def`s. [INFO] [stdout] 96 | | /// [INFO] [stdout] 97 | | /// Because this is an `extern type`, it is unsized, but has zero metadata. [INFO] [stdout] ... | [INFO] [stdout] 100 | | pub type Dynamic; [INFO] [stdout] 101 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/run/def.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | / extern "C" { [INFO] [stdout] 95 | | /// An internal type used to mark dynamic `Def`s. [INFO] [stdout] 96 | | /// [INFO] [stdout] 97 | | /// Because this is an `extern type`, it is unsized, but has zero metadata. [INFO] [stdout] ... | [INFO] [stdout] 100 | | pub type Dynamic; [INFO] [stdout] 101 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:41 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:76 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `inline_const` has been stable since 1.79.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:41 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(stable_features)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable [INFO] [stdout] --> src/lib.rs:1:76 [INFO] [stdout] | [INFO] [stdout] 1 | #![feature(const_type_id, extern_types, inline_const, generic_const_exprs, new_uninit)] [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `host` [INFO] [stdout] --> src/compile.rs:14:21 [INFO] [stdout] | [INFO] [stdout] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `host` [INFO] [stdout] --> src/compile.rs:14:21 [INFO] [stdout] | [INFO] [stdout] 14 | pub fn compile_host(host: &Host) -> String { [INFO] [stdout] | ^^^^ help: if this is intentional, prefix it with an underscore: `_host` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:132:8 [INFO] [stdout] | [INFO] [stdout] 132 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | pub unsafe fn downcast_ptr(slf: *const Def) -> Option<*const Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:136:8 [INFO] [stdout] | [INFO] [stdout] 136 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe fn downcast_mut_ptr(slf: *mut Def) -> Option<*mut Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:33 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | pub unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:34 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:31 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:32 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:175:34 [INFO] [stdout] | [INFO] [stdout] 175 | DynNetMut::Strict(net) => ((*slf).data.0)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:173:3 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:176:32 [INFO] [stdout] | [INFO] [stdout] 176 | DynNetMut::Lazy(net) => ((*slf).data.1)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/ops.rs:48:1 [INFO] [stdout] | [INFO] [stdout] 48 | / bi_enum! { [INFO] [stdout] 49 | | #[repr(u8)] [INFO] [stdout] 50 | | /// Native operations on mixed-width integers (u8, u16, u32, u60, i8, i16, i32). [INFO] [stdout] 51 | | /// [INFO] [stdout] ... | [INFO] [stdout] 80 | | } [INFO] [stdout] 81 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:132:8 [INFO] [stdout] | [INFO] [stdout] 132 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:131:3 [INFO] [stdout] | [INFO] [stdout] 131 | pub unsafe fn downcast_ptr(slf: *const Def) -> Option<*const Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:136:8 [INFO] [stdout] | [INFO] [stdout] 136 | if (*slf).ty == TypeId::of::() { Some(slf.cast()) } else { None } [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | pub unsafe fn downcast_mut_ptr(slf: *mut Def) -> Option<*mut Def> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:33 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | pub unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:149:34 [INFO] [stdout] | [INFO] [stdout] 149 | DynNetMut::Strict(net) => ((*slf).call_strict)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:31 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:150:32 [INFO] [stdout] | [INFO] [stdout] 150 | DynNetMut::Lazy(net) => ((*slf).call_lazy)(slf as *const _, net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `a` [INFO] [stdout] --> src/run/interact.rs:6:30 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/run/interact.rs:6:39 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:175:34 [INFO] [stdout] | [INFO] [stdout] 175 | DynNetMut::Strict(net) => ((*slf).data.0)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/def.rs:173:3 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/run/def.rs:176:32 [INFO] [stdout] | [INFO] [stdout] 176 | DynNetMut::Lazy(net) => ((*slf).data.1)(net, port), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `a` [INFO] [stdout] --> src/run/interact.rs:6:30 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `b` [INFO] [stdout] --> src/run/interact.rs:6:39 [INFO] [stdout] | [INFO] [stdout] 6 | pub fn interact(&mut self, a: Port, b: Port) { [INFO] [stdout] | ^ help: if this is intentional, prefix it with an underscore: `_b` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `run::def::Def::downcast_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:150:28 [INFO] [stdout] | [INFO] [stdout] 150 | if let Some(other) = Def::downcast_ptr::(other) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/net.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:151:20 [INFO] [stdout] | [INFO] [stdout] 151 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:152:22 [INFO] [stdout] | [INFO] [stdout] 152 | let other = *Box::from_raw(other as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:158:16 [INFO] [stdout] | [INFO] [stdout] 158 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `run::def::Def::downcast_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:150:28 [INFO] [stdout] | [INFO] [stdout] 150 | if let Some(other) = Def::downcast_ptr::(other) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/run/net.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | unsafe fn call(def: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:151:20 [INFO] [stdout] | [INFO] [stdout] 151 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:152:22 [INFO] [stdout] | [INFO] [stdout] 152 | let other = *Box::from_raw(other as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/run/net.rs:158:16 [INFO] [stdout] | [INFO] [stdout] 158 | let def = *Box::from_raw(def as *mut Def); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `stdlib::HostedDef::::new_hosted` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | HostedDef::new_hosted(LabSet::ALL, LogDef(host, f)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:37:3 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn new(host: Arc>, f: F) -> DefRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:102:13 [INFO] [stdout] | [INFO] [stdout] 102 | T::call(Box::from_raw(slf as *mut _), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | T::call(Arc::from_raw(slf as *mut _), net, port); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:155:13 [INFO] [stdout] | [INFO] [stdout] 155 | T::call((slf as *const Def).as_ref().unwrap(), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:154:3 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/run/port.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | / bi_enum! { [INFO] [stdout] 22 | | #[repr(u8)] [INFO] [stdout] 23 | | #[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Hash)] [INFO] [stdout] 24 | | pub enum Tag { [INFO] [stdout] ... | [INFO] [stdout] 86 | | } [INFO] [stdout] 87 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | Box::from_raw(self.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:167:3 [INFO] [stdout] | [INFO] [stdout] 167 | unsafe fn to_box(self) -> Box { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `stdlib::HostedDef::::new_hosted` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | HostedDef::new_hosted(LabSet::ALL, LogDef(host, f)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:37:3 [INFO] [stdout] | [INFO] [stdout] 37 | pub unsafe fn new(host: Arc>, f: F) -> DefRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:102:13 [INFO] [stdout] | [INFO] [stdout] 102 | T::call(Box::from_raw(slf as *mut _), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:101:3 [INFO] [stdout] | [INFO] [stdout] 101 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | T::call(Arc::from_raw(slf as *mut _), net, port); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:135:3 [INFO] [stdout] | [INFO] [stdout] 135 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::as_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:155:13 [INFO] [stdout] | [INFO] [stdout] 155 | T::call((slf as *const Def).as_ref().unwrap(), net, port) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:154:3 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn call(slf: *const Def, net: &mut Net, port: Port) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/stdlib.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | Box::from_raw(self.0) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/stdlib.rs:167:3 [INFO] [stdout] | [INFO] [stdout] 167 | unsafe fn to_box(self) -> Box { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 61 | / bi_enum! { [INFO] [stdout] 62 | | #[repr(u8)] [INFO] [stdout] 63 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 64 | | enum Trit { [INFO] [stdout] ... | [INFO] [stdout] 68 | | } [INFO] [stdout] 69 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 61 | / bi_enum! { [INFO] [stdout] 62 | | #[repr(u8)] [INFO] [stdout] 63 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 64 | | enum Trit { [INFO] [stdout] ... | [INFO] [stdout] 68 | | } [INFO] [stdout] 69 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::result::Result::::unwrap_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/bi_enum.rs:22:9 [INFO] [stdout] | [INFO] [stdout] 22 | Self::try_from(value).unwrap_unchecked() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 74 | / bi_enum! { [INFO] [stdout] 75 | | #[repr(u8)] [INFO] [stdout] 76 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 77 | | enum Op { [INFO] [stdout] ... | [INFO] [stdout] 82 | | } [INFO] [stdout] 83 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/bi_enum.rs:21:7 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn from_unchecked(value: $uN) -> $Ty { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 74 | / bi_enum! { [INFO] [stdout] 75 | | #[repr(u8)] [INFO] [stdout] 76 | | #[derive(Debug, Clone, Copy, PartialEq, Eq)] [INFO] [stdout] 77 | | enum Op { [INFO] [stdout] ... | [INFO] [stdout] 82 | | } [INFO] [stdout] 83 | | } [INFO] [stdout] | |___- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `bi_enum` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 2 previous errors; 24 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `hvm-core` (lib) due to 3 previous errors; 24 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error: aborting due to 2 previous errors; 26 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `hvm-core` (lib test) due to 3 previous errors; 26 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "1a2c753ed7e5a4961cc1890bbae0b7c89083844b91a39c4adfdf0d976e61d8f7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1a2c753ed7e5a4961cc1890bbae0b7c89083844b91a39c4adfdf0d976e61d8f7", kill_on_drop: false }` [INFO] [stdout] 1a2c753ed7e5a4961cc1890bbae0b7c89083844b91a39c4adfdf0d976e61d8f7