[INFO] fetching crate j4rs 0.20.0... [INFO] checking j4rs-0.20.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate j4rs 0.20.0 into /workspace/builds/worker-2-tc2/source [INFO] validating manifest of crates.io crate j4rs 0.20.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate j4rs 0.20.0 [INFO] finished tweaking crates.io crate j4rs 0.20.0 [INFO] tweaked toml for crates.io crate j4rs 0.20.0 written to /workspace/builds/worker-2-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 142 packages to latest compatible versions [INFO] [stderr] Adding anes v0.1.6 (available: v0.2.0) [INFO] [stderr] Adding async-channel v1.9.0 (available: v2.3.1) [INFO] [stderr] Adding event-listener v2.5.3 (available: v5.3.1) [INFO] [stderr] Adding hermit-abi v0.3.9 (available: v0.4.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 56d972871bf22fb6b16e392d960bf5a5bc39675b0b9605a278984fe75237a641 [INFO] running `Command { std: "docker" "start" "-a" "56d972871bf22fb6b16e392d960bf5a5bc39675b0b9605a278984fe75237a641", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "56d972871bf22fb6b16e392d960bf5a5bc39675b0b9605a278984fe75237a641", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "56d972871bf22fb6b16e392d960bf5a5bc39675b0b9605a278984fe75237a641", kill_on_drop: false }` [INFO] [stdout] 56d972871bf22fb6b16e392d960bf5a5bc39675b0b9605a278984fe75237a641 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 49e8cb99f23bd51f81f249eff4432eaa9f9bb3a3b8f0e286704e2b973fa5d7e0 [INFO] running `Command { std: "docker" "start" "-a" "49e8cb99f23bd51f81f249eff4432eaa9f9bb3a3b8f0e286704e2b973fa5d7e0", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Checking parking v2.2.1 [INFO] [stderr] Compiling serde v1.0.210 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Checking concurrent-queue v2.5.0 [INFO] [stderr] Checking tracing-core v0.1.32 [INFO] [stderr] Checking linux-raw-sys v0.4.14 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Checking futures-lite v2.3.0 [INFO] [stderr] Checking event-listener v5.3.1 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking value-bag v1.9.0 [INFO] [stderr] Checking piper v0.2.4 [INFO] [stderr] Checking tracing v0.1.40 [INFO] [stderr] Checking event-listener-strategy v0.5.2 [INFO] [stderr] Checking anstyle v1.0.8 [INFO] [stderr] Checking async-lock v3.4.0 [INFO] [stderr] Checking async-channel v2.3.1 [INFO] [stderr] Checking log v0.4.22 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Compiling fs_extra v1.3.0 [INFO] [stderr] Checking clap_lex v0.7.2 [INFO] [stderr] Checking plotters-backend v0.3.7 [INFO] [stderr] Checking blocking v1.6.1 [INFO] [stderr] Checking async-executor v1.13.1 [INFO] [stderr] Checking plotters-svg v0.3.7 [INFO] [stderr] Checking clap_builder v4.5.18 [INFO] [stderr] Compiling j4rs v0.20.0 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Compiling jni-sys-macros v0.1.0 [INFO] [stderr] Checking event-listener v2.5.3 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking async-channel v1.9.0 [INFO] [stderr] Checking java-locator v0.1.7 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking jni-sys v0.4.0 [INFO] [stderr] Checking parking_lot v0.12.3 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking kv-log-macro v1.0.7 [INFO] [stderr] Checking clap v4.5.18 [INFO] [stderr] Checking criterion-plot v0.5.0 [INFO] [stderr] Checking is-terminal v0.4.13 [INFO] [stderr] Checking mio v1.0.2 [INFO] [stderr] Checking socket2 v0.5.7 [INFO] [stderr] Compiling async-attributes v1.1.2 [INFO] [stderr] Checking signal-hook-registry v1.4.2 [INFO] [stderr] Checking libloading v0.8.5 [INFO] [stderr] Checking oorandom v11.1.4 [INFO] [stderr] Checking cesu8 v1.1.0 [INFO] [stderr] Checking dunce v1.0.5 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Compiling serde_derive v1.0.210 [INFO] [stderr] Compiling futures-macro v0.3.30 [INFO] [stderr] Compiling tokio-macros v2.4.0 [INFO] [stderr] Checking tokio v1.40.0 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Checking polling v3.7.3 [INFO] [stderr] Checking async-io v2.3.4 [INFO] [stderr] Checking async-global-executor v2.4.1 [INFO] [stderr] Checking async-std v1.13.0 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Checking futures v0.3.30 [INFO] [stderr] Checking serde_json v1.0.128 [INFO] [stderr] Checking ciborium v0.2.2 [INFO] [stderr] Checking tinytemplate v1.2.1 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking criterion v0.5.1 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `j4rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/api/instance.rs [INFO] [stderr] * src/api/mod.rs [INFO] [stderr] * src/cache.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/cache.rs:343:23 [INFO] [stderr] | [INFO] [stderr] 343 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/instance.rs:179:60 [INFO] [stderr] | [INFO] [stderr] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1719:83 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1728:18 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1736:64 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:83:3 [INFO] [stdout] | [INFO] [stdout] 83 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 83 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:111:3 [INFO] [stdout] | [INFO] [stdout] 111 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 111 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:136:3 [INFO] [stdout] | [INFO] [stdout] 136 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 136 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:179:60 [INFO] [stdout] | [INFO] [stdout] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/api/mod.rs:1742:71 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1751:64 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1761:88 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1770:74 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1777:61 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1784:69 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1790:88 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1796:57 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1719:83 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1728:18 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/api/mod.rs:1822:62 [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1736:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1742:71 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1751:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1761:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] ... [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1770:74 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:150:18 [INFO] [stderr] | [INFO] [stderr] 142 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 150 | let tx = unsafe { Box::from_raw(p) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] error: aborting due to 1 previous error; 14 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1777:61 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1784:69 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1790:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1796:57 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1822:62 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/cache.rs:343:36 [INFO] [stdout] | [INFO] [stdout] 343 | ($opt_name:ident, $do_retrieve:expr, $setter_name:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 343 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:53 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:62 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:54 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:23 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:23 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:58 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:59 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:56 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:57 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:56 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:55 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:56 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:57 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:58 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:56 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:23 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:23 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:23 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:23 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:23 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:23 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:23 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:23 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:23 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:23 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:23 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:23 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:23 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:23 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:23 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:23 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:23 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:23 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:56 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:23 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:55 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:58 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:57 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:55 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:56 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:57 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:54 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:61 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:62 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:409:24 [INFO] [stdout] | [INFO] [stdout] 409 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:410:25 [INFO] [stdout] | [INFO] [stdout] 410 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:411:25 [INFO] [stdout] | [INFO] [stdout] 411 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1541:27 [INFO] [stdout] | [INFO] [stdout] 1541 | let java_string = (opt_to_res(cache::get_jni_call_static_object_method())?)( [INFO] [stdout] | ___________________________^ [INFO] [stdout] 1542 | | jni_env, [INFO] [stdout] 1543 | | cache::get_utils_class()?, [INFO] [stdout] 1544 | | cache::get_utils_exception_to_string_method()?, [INFO] [stdout] 1545 | | throwable, [INFO] [stdout] 1546 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:1540:5 [INFO] [stdout] | [INFO] [stdout] 1540 | unsafe fn get_throwable_string(throwable: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::string_from_jobject` is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1547:9 [INFO] [stdout] | [INFO] [stdout] 1547 | jni_utils::string_from_jobject(java_string, jni_env) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:99:25 [INFO] [stdout] | [INFO] [stdout] 99 | let j = (opt_to_res(cache::get_jni_new_object_array())?)( [INFO] [stdout] | _________________________^ [INFO] [stdout] 100 | | s.jni_env, [INFO] [stdout] 101 | | size, [INFO] [stdout] 102 | | cache::get_invocation_arg_class()?, [INFO] [stdout] 103 | | ptr::null_mut(), [INFO] [stdout] 104 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/async_api/mod.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | unsafe fn handle_channel_sender(s: &Jvm, sender: oneshot::Sender>, instance: &Instance, method_name: &str, inv_args: &[InvocationArg]) -> errors::Result<()... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:115:17 [INFO] [stdout] | [INFO] [stdout] 115 | / (opt_to_res(cache::get_jni_set_object_array_element())?)( [INFO] [stdout] 116 | | s.jni_env, [INFO] [stdout] 117 | | array_ptr, [INFO] [stdout] 118 | | i, [INFO] [stdout] 119 | | inv_arg_java, [INFO] [stdout] 120 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:125:21 [INFO] [stdout] | [INFO] [stdout] 125 | let _ = (opt_to_res(cache::get_jni_call_void_method())?)( [INFO] [stdout] | _____________________^ [INFO] [stdout] 126 | | s.jni_env, [INFO] [stdout] 127 | | instance.jinstance, [INFO] [stdout] 128 | | cache::get_invoke_async_method()?, [INFO] [stdout] ... | [INFO] [stdout] 131 | | array_ptr, [INFO] [stdout] 132 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:295:17 [INFO] [stdout] | [INFO] [stdout] 295 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 296 | | jni_env, [INFO] [stdout] 297 | | obj, [INFO] [stdout] 298 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 299 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:289:1 [INFO] [stdout] | [INFO] [stdout] 289 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:336:17 [INFO] [stdout] | [INFO] [stdout] 336 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 337 | | jni_env, [INFO] [stdout] 338 | | obj, [INFO] [stdout] 339 | | cache::get_short_to_short_method()?, [INFO] [stdout] 340 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:330:1 [INFO] [stdout] | [INFO] [stdout] 330 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:351:17 [INFO] [stdout] | [INFO] [stdout] 351 | let v = (opt_to_res(cache::get_jni_call_char_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 352 | | jni_env, [INFO] [stdout] 353 | | obj, [INFO] [stdout] 354 | | cache::get_character_to_char_method()?, [INFO] [stdout] 355 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn u16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:379:17 [INFO] [stdout] | [INFO] [stdout] 379 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 380 | | jni_env, [INFO] [stdout] 381 | | obj, [INFO] [stdout] 382 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 383 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:373:1 [INFO] [stdout] | [INFO] [stdout] 373 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:407:17 [INFO] [stdout] | [INFO] [stdout] 407 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 408 | | jni_env, [INFO] [stdout] 409 | | obj, [INFO] [stdout] 410 | | cache::get_long_to_long_method()?, [INFO] [stdout] 411 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:401:1 [INFO] [stdout] | [INFO] [stdout] 401 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:435:17 [INFO] [stdout] | [INFO] [stdout] 435 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 436 | | jni_env, [INFO] [stdout] 437 | | obj, [INFO] [stdout] 438 | | cache::get_float_to_float_method()?, [INFO] [stdout] 439 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:429:1 [INFO] [stdout] | [INFO] [stdout] 429 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:463:17 [INFO] [stdout] | [INFO] [stdout] 463 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 464 | | jni_env, [INFO] [stdout] 465 | | obj, [INFO] [stdout] 466 | | cache::get_double_to_double_method()?, [INFO] [stdout] 467 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:457:1 [INFO] [stdout] | [INFO] [stdout] 457 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:527:17 [INFO] [stdout] | [INFO] [stdout] 527 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:518:1 [INFO] [stdout] | [INFO] [stdout] 518 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 519 | | obj: jobject, [INFO] [stdout] 520 | | jni_env: *mut JNIEnv, [INFO] [stdout] 521 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:536:13 [INFO] [stdout] | [INFO] [stdout] 536 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 537 | | jvm.jni_env, [INFO] [stdout] 538 | | java_string, [INFO] [stdout] 539 | | ptr::null_mut(), [INFO] [stdout] 540 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:535:1 [INFO] [stdout] | [INFO] [stdout] 535 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:542:5 [INFO] [stdout] | [INFO] [stdout] 542 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:548:13 [INFO] [stdout] | [INFO] [stdout] 548 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 549 | | jni_env, [INFO] [stdout] 550 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 551 | | message_jstring.as_ptr(), [INFO] [stdout] 552 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:546:1 [INFO] [stdout] | [INFO] [stdout] 546 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:147:22 [INFO] [stdout] | [INFO] [stdout] 147 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:137:1 [INFO] [stdout] | [INFO] [stdout] 137 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 138 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 139 | | _class: *const c_void, [INFO] [stdout] 140 | | ptr_address: jlong, [INFO] [stdout] 141 | | stacktrace: jstring, [INFO] [stdout] 142 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:94:8 [INFO] [stdout] | [INFO] [stdout] 94 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:106:5 [INFO] [stdout] | [INFO] [stdout] 106 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 94 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 95 | let p = ptr_address as *mut Sender; [INFO] [stdout] ... [INFO] [stdout] 105 | } [INFO] [stdout] 106 ~ } _ => { [INFO] [stdout] 107 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 108 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:100:12 [INFO] [stdout] | [INFO] [stdout] 100 | if let Err(error) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:105:9 [INFO] [stdout] | [INFO] [stdout] 105 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 100 ~ match result { Err(error) => { [INFO] [stdout] 101 | panic!( [INFO] [stdout] ... [INFO] [stdout] 104 | ); [INFO] [stdout] 105 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:123:8 [INFO] [stdout] | [INFO] [stdout] 123 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 123 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 124 | let p = ptr_address as *mut oneshot::Sender>; [INFO] [stdout] ... [INFO] [stdout] 130 | } [INFO] [stdout] 131 ~ } _ => { [INFO] [stdout] 132 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 133 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:128:12 [INFO] [stdout] | [INFO] [stdout] 128 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 128 ~ match result { Err(_) => { [INFO] [stdout] 129 | panic!("Could not send to the defined callback channel to complete the future"); [INFO] [stdout] 130 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:153:12 [INFO] [stdout] | [INFO] [stdout] 153 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 153 ~ match result { Err(_) => { [INFO] [stdout] 154 | panic!("Could not send to the defined callback channel to fail a future"); [INFO] [stdout] 155 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 217 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating benches/j4rs_benchmark.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `j4rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/api/instance.rs [INFO] [stderr] * src/api/mod.rs [INFO] [stderr] * src/cache.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/cache.rs:343:23 [INFO] [stderr] | [INFO] [stderr] 343 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/instance.rs:179:60 [INFO] [stderr] | [INFO] [stderr] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1719:83 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1728:18 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1736:64 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1742:71 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1751:64 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1761:88 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1770:74 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1777:61 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1784:69 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1790:88 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1796:57 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:83:3 [INFO] [stdout] | [INFO] [stdout] 83 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 83 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:111:3 [INFO] [stdout] | [INFO] [stdout] 111 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 111 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] ... [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:136:3 [INFO] [stdout] | [INFO] [stdout] 136 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 136 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:179:60 [INFO] [stdout] | [INFO] [stdout] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1719:83 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1728:18 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1736:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/api/mod.rs:1822:62 [INFO] [stderr] | [INFO] [stderr] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:150:18 [INFO] [stderr] | [INFO] [stderr] 142 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 150 | let tx = unsafe { Box::from_raw(p) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] error: aborting due to 1 previous error; 14 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1742:71 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1751:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1761:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1770:74 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1777:61 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1784:69 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1790:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1796:57 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1822:62 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/cache.rs:343:36 [INFO] [stdout] | [INFO] [stdout] 343 | ($opt_name:ident, $do_retrieve:expr, $setter_name:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 343 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:53 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:62 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:54 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:23 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:23 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:58 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:59 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:56 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:57 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:56 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:55 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:56 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:57 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:58 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:56 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:23 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:23 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:23 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:23 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:23 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:23 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:23 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:23 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:23 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:23 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:23 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:23 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:23 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:23 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:23 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:23 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:23 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:23 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:56 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:23 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:55 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:58 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:57 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:55 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:56 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:57 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:54 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:61 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:62 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:409:24 [INFO] [stdout] | [INFO] [stdout] 409 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:410:25 [INFO] [stdout] | [INFO] [stdout] 410 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:411:25 [INFO] [stdout] | [INFO] [stdout] 411 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1541:27 [INFO] [stdout] | [INFO] [stdout] 1541 | let java_string = (opt_to_res(cache::get_jni_call_static_object_method())?)( [INFO] [stdout] | ___________________________^ [INFO] [stdout] 1542 | | jni_env, [INFO] [stdout] 1543 | | cache::get_utils_class()?, [INFO] [stdout] 1544 | | cache::get_utils_exception_to_string_method()?, [INFO] [stdout] 1545 | | throwable, [INFO] [stdout] 1546 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:1540:5 [INFO] [stdout] | [INFO] [stdout] 1540 | unsafe fn get_throwable_string(throwable: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::string_from_jobject` is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1547:9 [INFO] [stdout] | [INFO] [stdout] 1547 | jni_utils::string_from_jobject(java_string, jni_env) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:99:25 [INFO] [stdout] | [INFO] [stdout] 99 | let j = (opt_to_res(cache::get_jni_new_object_array())?)( [INFO] [stdout] | _________________________^ [INFO] [stdout] 100 | | s.jni_env, [INFO] [stdout] 101 | | size, [INFO] [stdout] 102 | | cache::get_invocation_arg_class()?, [INFO] [stdout] 103 | | ptr::null_mut(), [INFO] [stdout] 104 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/async_api/mod.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | unsafe fn handle_channel_sender(s: &Jvm, sender: oneshot::Sender>, instance: &Instance, method_name: &str, inv_args: &[InvocationArg]) -> errors::Result<()... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:115:17 [INFO] [stdout] | [INFO] [stdout] 115 | / (opt_to_res(cache::get_jni_set_object_array_element())?)( [INFO] [stdout] 116 | | s.jni_env, [INFO] [stdout] 117 | | array_ptr, [INFO] [stdout] 118 | | i, [INFO] [stdout] 119 | | inv_arg_java, [INFO] [stdout] 120 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:125:21 [INFO] [stdout] | [INFO] [stdout] 125 | let _ = (opt_to_res(cache::get_jni_call_void_method())?)( [INFO] [stdout] | _____________________^ [INFO] [stdout] 126 | | s.jni_env, [INFO] [stdout] 127 | | instance.jinstance, [INFO] [stdout] 128 | | cache::get_invoke_async_method()?, [INFO] [stdout] ... | [INFO] [stdout] 131 | | array_ptr, [INFO] [stdout] 132 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:295:17 [INFO] [stdout] | [INFO] [stdout] 295 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 296 | | jni_env, [INFO] [stdout] 297 | | obj, [INFO] [stdout] 298 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 299 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:289:1 [INFO] [stdout] | [INFO] [stdout] 289 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:336:17 [INFO] [stdout] | [INFO] [stdout] 336 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 337 | | jni_env, [INFO] [stdout] 338 | | obj, [INFO] [stdout] 339 | | cache::get_short_to_short_method()?, [INFO] [stdout] 340 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:330:1 [INFO] [stdout] | [INFO] [stdout] 330 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:351:17 [INFO] [stdout] | [INFO] [stdout] 351 | let v = (opt_to_res(cache::get_jni_call_char_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 352 | | jni_env, [INFO] [stdout] 353 | | obj, [INFO] [stdout] 354 | | cache::get_character_to_char_method()?, [INFO] [stdout] 355 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | pub(crate) unsafe fn u16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:379:17 [INFO] [stdout] | [INFO] [stdout] 379 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 380 | | jni_env, [INFO] [stdout] 381 | | obj, [INFO] [stdout] 382 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 383 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:373:1 [INFO] [stdout] | [INFO] [stdout] 373 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:407:17 [INFO] [stdout] | [INFO] [stdout] 407 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 408 | | jni_env, [INFO] [stdout] 409 | | obj, [INFO] [stdout] 410 | | cache::get_long_to_long_method()?, [INFO] [stdout] 411 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:401:1 [INFO] [stdout] | [INFO] [stdout] 401 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:435:17 [INFO] [stdout] | [INFO] [stdout] 435 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 436 | | jni_env, [INFO] [stdout] 437 | | obj, [INFO] [stdout] 438 | | cache::get_float_to_float_method()?, [INFO] [stdout] 439 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:429:1 [INFO] [stdout] | [INFO] [stdout] 429 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:463:17 [INFO] [stdout] | [INFO] [stdout] 463 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 464 | | jni_env, [INFO] [stdout] 465 | | obj, [INFO] [stdout] 466 | | cache::get_double_to_double_method()?, [INFO] [stdout] 467 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:457:1 [INFO] [stdout] | [INFO] [stdout] 457 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 509 | primitive_array_from_jobject!(i8_array_from_jobject, i8, cache::get_jni_get_byte_array_elements, cache::get_jni_release_byte_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 510 | primitive_array_from_jobject!(i16_array_from_jobject, i16, cache::get_jni_get_short_array_elements, cache::get_jni_release_short_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 511 | primitive_array_from_jobject!(u16_array_from_jobject, u16, cache::get_jni_get_char_array_elements, cache::get_jni_release_char_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 512 | primitive_array_from_jobject!(i32_array_from_jobject, i32, cache::get_jni_get_int_array_elements, cache::get_jni_release_int_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 513 | primitive_array_from_jobject!(i64_array_from_jobject, i64, cache::get_jni_get_long_array_elements, cache::get_jni_release_long_array_element... [INFO] [stdout] | ---------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 514 | primitive_array_from_jobject!(f32_array_from_jobject, f32, cache::get_jni_get_float_array_elements, cache::get_jni_release_float_array_element... [INFO] [stdout] | ------------------------------------------------------------------------------------------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 515 | primitive_array_from_jobject!(f64_array_from_jobject, f64, cache::get_jni_get_double_array_elements, cache::get_jni_release_double_array_element... [INFO] [stdout] | -------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:481:30 [INFO] [stdout] | [INFO] [stdout] 481 | let length = (opt_to_res(cache::get_jni_get_array_length())?)( [INFO] [stdout] | ______________________________^ [INFO] [stdout] 482 | | jni_env, [INFO] [stdout] 483 | | obj [INFO] [stdout] 484 | | ) as usize; [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:474:9 [INFO] [stdout] | [INFO] [stdout] 474 | pub(crate) unsafe fn $fn_name(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:485:31 [INFO] [stdout] | [INFO] [stdout] 485 | let val_ptr = (opt_to_res($get_array_element())?)( [INFO] [stdout] | _______________________________^ [INFO] [stdout] 486 | | jni_env, [INFO] [stdout] 487 | | obj, [INFO] [stdout] 488 | | ptr::null_mut() [INFO] [stdout] 489 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:495:17 [INFO] [stdout] | [INFO] [stdout] 495 | ptr::copy_nonoverlapping(val_ptr as *const u8, vec.as_mut_ptr() as *mut u8, total_bytes); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:496:17 [INFO] [stdout] | [INFO] [stdout] 496 | vec.set_len(length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:497:17 [INFO] [stdout] | [INFO] [stdout] 497 | / (opt_to_res($release_array_element())?)( [INFO] [stdout] 498 | | jni_env, [INFO] [stdout] 499 | | obj, [INFO] [stdout] 500 | | val_ptr, [INFO] [stdout] 501 | | jni_sys::JNI_ABORT, [INFO] [stdout] 502 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] ... [INFO] [stdout] 516 | primitive_array_from_jobject!(boolean_array_from_jobject, bool, cache::get_jni_get_boolean_array_elements, cache::get_jni_release_boolean_array_element... [INFO] [stdout] | --------------------------------------------------------------------------------------------------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `primitive_array_from_jobject` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:527:17 [INFO] [stdout] | [INFO] [stdout] 527 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:518:1 [INFO] [stdout] | [INFO] [stdout] 518 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 519 | | obj: jobject, [INFO] [stdout] 520 | | jni_env: *mut JNIEnv, [INFO] [stdout] 521 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:536:13 [INFO] [stdout] | [INFO] [stdout] 536 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 537 | | jvm.jni_env, [INFO] [stdout] 538 | | java_string, [INFO] [stdout] 539 | | ptr::null_mut(), [INFO] [stdout] 540 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:535:1 [INFO] [stdout] | [INFO] [stdout] 535 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:542:5 [INFO] [stdout] | [INFO] [stdout] 542 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:548:13 [INFO] [stdout] | [INFO] [stdout] 548 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 549 | | jni_env, [INFO] [stdout] 550 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 551 | | message_jstring.as_ptr(), [INFO] [stdout] 552 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:546:1 [INFO] [stdout] | [INFO] [stdout] 546 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:147:22 [INFO] [stdout] | [INFO] [stdout] 147 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:137:1 [INFO] [stdout] | [INFO] [stdout] 137 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 138 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 139 | | _class: *const c_void, [INFO] [stdout] 140 | | ptr_address: jlong, [INFO] [stdout] 141 | | stacktrace: jstring, [INFO] [stdout] 142 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:94:8 [INFO] [stdout] | [INFO] [stdout] 94 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:106:5 [INFO] [stdout] | [INFO] [stdout] 106 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 94 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 95 | let p = ptr_address as *mut Sender; [INFO] [stdout] ... [INFO] [stdout] 105 | } [INFO] [stdout] 106 ~ } _ => { [INFO] [stdout] 107 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 108 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:100:12 [INFO] [stdout] | [INFO] [stdout] 100 | if let Err(error) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:105:9 [INFO] [stdout] | [INFO] [stdout] 105 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 100 ~ match result { Err(error) => { [INFO] [stdout] 101 | panic!( [INFO] [stdout] ... [INFO] [stdout] 104 | ); [INFO] [stdout] 105 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:123:8 [INFO] [stdout] | [INFO] [stdout] 123 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:131:5 [INFO] [stdout] | [INFO] [stdout] 131 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 123 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 124 | let p = ptr_address as *mut oneshot::Sender>; [INFO] [stdout] ... [INFO] [stdout] 130 | } [INFO] [stdout] 131 ~ } _ => { [INFO] [stdout] 132 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 133 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:128:12 [INFO] [stdout] | [INFO] [stdout] 128 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 128 ~ match result { Err(_) => { [INFO] [stdout] 129 | panic!("Could not send to the defined callback channel to complete the future"); [INFO] [stdout] 130 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:153:12 [INFO] [stdout] | [INFO] [stdout] 153 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:155:9 [INFO] [stdout] | [INFO] [stdout] 155 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 153 ~ match result { Err(_) => { [INFO] [stdout] 154 | panic!("Could not send to the defined callback channel to fail a future"); [INFO] [stdout] 155 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 217 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning: function `do_instance_creation` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:11:4 [INFO] [stdout] | [INFO] [stdout] 11 | fn do_instance_creation(jvm: &Jvm) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_no_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:16:4 [INFO] [stdout] | [INFO] [stdout] 16 | fn do_invocation_w_no_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_string_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:20:4 [INFO] [stdout] | [INFO] [stdout] 20 | fn do_invocation_w_string_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_integer_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:29:4 [INFO] [stdout] | [INFO] [stdout] 29 | fn do_invocation_w_integer_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_string_args_and_to_rust` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:38:4 [INFO] [stdout] | [INFO] [stdout] 38 | fn do_invocation_w_string_args_and_to_rust(jvm: &Jvm, instance: &Instance) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `j4rs_benchmark` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:89:4 [INFO] [stdout] | [INFO] [stdout] 89 | fn j4rs_benchmark(c: &mut Criterion) { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 10.39s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Compiling j4rs v0.20.0 (/tmp/fixit) [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:83:3 [INFO] [stdout] | [INFO] [stdout] 83 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 83 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:111:3 [INFO] [stdout] | [INFO] [stdout] 111 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 111 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:136:3 [INFO] [stdout] | [INFO] [stdout] 136 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 136 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:179:60 [INFO] [stdout] | [INFO] [stdout] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:83:3 [INFO] [stdout] | [INFO] [stdout] 83 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 83 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:111:3 [INFO] [stdout] | [INFO] [stdout] 111 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 111 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:136:3 [INFO] [stdout] | [INFO] [stdout] 136 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 136 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1719:83 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1728:18 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1736:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1742:71 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1751:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1761:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1770:74 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1777:61 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1784:69 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1790:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1796:57 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1822:62 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:179:60 [INFO] [stdout] | [INFO] [stdout] 178 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 179 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1719:83 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1719 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1728:18 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1728 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1736:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1736 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1742:71 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1742 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1751:64 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1751 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1761:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1761 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1770:74 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1770 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1777:61 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1777 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1784:69 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1784 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1790:88 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1790 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1796:57 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1796 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1822:62 [INFO] [stdout] | [INFO] [stdout] 1701 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1822 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:53 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:62 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:54 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:23 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:23 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:58 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:59 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:56 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:57 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:56 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:55 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:56 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:57 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:58 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:56 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:23 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:23 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:23 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:23 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:23 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:23 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:23 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:23 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:23 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:23 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:23 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:23 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:23 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:23 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:23 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:23 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:23 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:23 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:56 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:23 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:55 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:58 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:57 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:55 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:56 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:57 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:54 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:61 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:60 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:405:62 [INFO] [stdout] | [INFO] [stdout] 405 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:409:24 [INFO] [stdout] | [INFO] [stdout] 409 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:410:25 [INFO] [stdout] | [INFO] [stdout] 410 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:411:25 [INFO] [stdout] | [INFO] [stdout] 411 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1541:27 [INFO] [stdout] | [INFO] [stdout] 1541 | let java_string = (opt_to_res(cache::get_jni_call_static_object_method())?)( [INFO] [stdout] | ___________________________^ [INFO] [stdout] 1542 | | jni_env, [INFO] [stdout] 1543 | | cache::get_utils_class()?, [INFO] [stdout] 1544 | | cache::get_utils_exception_to_string_method()?, [INFO] [stdout] 1545 | | throwable, [INFO] [stdout] 1546 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:1540:5 [INFO] [stdout] | [INFO] [stdout] 1540 | unsafe fn get_throwable_string(throwable: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::string_from_jobject` is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:1547:9 [INFO] [stdout] | [INFO] [stdout] 1547 | jni_utils::string_from_jobject(java_string, jni_env) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:99:25 [INFO] [stdout] | [INFO] [stdout] 99 | let j = (opt_to_res(cache::get_jni_new_object_array())?)( [INFO] [stdout] | _________________________^ [INFO] [stdout] 100 | | s.jni_env, [INFO] [stdout] 101 | | size, [INFO] [stdout] 102 | | cache::get_invocation_arg_class()?, [INFO] [stdout] 103 | | ptr::null_mut(), [INFO] [stdout] 104 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/async_api/mod.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | unsafe fn handle_channel_sender(s: &Jvm, sender: oneshot::Sender>, instance: &Instance, method_name: &str, inv_args: &[InvocationArg]) -> errors::Result<()... [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:115:17 [INFO] [stdout] | [INFO] [stdout] 115 | / (opt_to_res(cache::get_jni_set_object_array_element())?)( [INFO] [stdout] 116 | | s.jni_env, [INFO] [stdout] 117 | | array_ptr, [INFO] [stdout] 118 | | i, [INFO] [stdout] 119 | | inv_arg_java, [INFO] [stdout] 120 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/async_api/mod.rs:125:21 [INFO] [stdout] | [INFO] [stdout] 125 | let _ = (opt_to_res(cache::get_jni_call_void_method())?)( [INFO] [stdout] | _____________________^ [INFO] [stdout] 126 | | s.jni_env, [INFO] [stdout] 127 | | instance.jinstance, [INFO] [stdout] 128 | | cache::get_invoke_async_method()?, [INFO] [stdout] ... | [INFO] [stdout] 131 | | array_ptr, [INFO] [stdout] 132 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:51 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:53 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:60 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:239:62 [INFO] [stdout] | [INFO] [stdout] 239 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:52 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:241:54 [INFO] [stdout] | [INFO] [stdout] 241 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:21 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:245:23 [INFO] [stdout] | [INFO] [stdout] 245 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:21 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:23 [INFO] [stdout] | [INFO] [stdout] 250 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:56 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:254:58 [INFO] [stdout] | [INFO] [stdout] 254 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:57 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:257:59 [INFO] [stdout] | [INFO] [stdout] 257 | cache::set_jni_call_boolean_method(Some((**jni_environment).v1_6.CallBooleanMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:54 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:260:56 [INFO] [stdout] | [INFO] [stdout] 260 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:55 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:263:57 [INFO] [stdout] | [INFO] [stdout] 263 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:54 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:266:56 [INFO] [stdout] | [INFO] [stdout] 266 | cache::set_jni_call_char_method(Some((**jni_environment).v1_6.CallCharMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:53 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:55 [INFO] [stdout] | [INFO] [stdout] 269 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:54 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:272:56 [INFO] [stdout] | [INFO] [stdout] 272 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:55 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:275:57 [INFO] [stdout] | [INFO] [stdout] 275 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:56 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:278:58 [INFO] [stdout] | [INFO] [stdout] 278 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:54 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:56 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:21 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:285:23 [INFO] [stdout] | [INFO] [stdout] 285 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:21 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:23 [INFO] [stdout] | [INFO] [stdout] 290 | (**jni_environment).v1_6.GetArrayLength, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:21 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:295:23 [INFO] [stdout] | [INFO] [stdout] 295 | (**jni_environment).v1_6.GetByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:21 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:300:23 [INFO] [stdout] | [INFO] [stdout] 300 | (**jni_environment).v1_6.ReleaseByteArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:21 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:23 [INFO] [stdout] | [INFO] [stdout] 305 | (**jni_environment).v1_6.GetShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:21 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:310:23 [INFO] [stdout] | [INFO] [stdout] 310 | (**jni_environment).v1_6.ReleaseShortArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:21 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:315:23 [INFO] [stdout] | [INFO] [stdout] 315 | (**jni_environment).v1_6.GetCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:21 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:320:23 [INFO] [stdout] | [INFO] [stdout] 320 | (**jni_environment).v1_6.ReleaseCharArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:21 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:325:23 [INFO] [stdout] | [INFO] [stdout] 325 | (**jni_environment).v1_6.GetIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:21 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:330:23 [INFO] [stdout] | [INFO] [stdout] 330 | (**jni_environment).v1_6.ReleaseIntArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:21 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:335:23 [INFO] [stdout] | [INFO] [stdout] 335 | (**jni_environment).v1_6.GetLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:21 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:340:23 [INFO] [stdout] | [INFO] [stdout] 340 | (**jni_environment).v1_6.ReleaseLongArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:21 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:345:23 [INFO] [stdout] | [INFO] [stdout] 345 | (**jni_environment).v1_6.GetFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:21 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:350:23 [INFO] [stdout] | [INFO] [stdout] 350 | (**jni_environment).v1_6.ReleaseFloatArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:21 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:355:23 [INFO] [stdout] | [INFO] [stdout] 355 | (**jni_environment).v1_6.GetDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:21 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:360:23 [INFO] [stdout] | [INFO] [stdout] 360 | (**jni_environment).v1_6.ReleaseDoubleArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:21 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:365:23 [INFO] [stdout] | [INFO] [stdout] 365 | (**jni_environment).v1_6.GetBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:21 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:370:23 [INFO] [stdout] | [INFO] [stdout] 370 | (**jni_environment).v1_6.ReleaseBooleanArrayElements, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:54 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:374:56 [INFO] [stdout] | [INFO] [stdout] 374 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:21 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:378:23 [INFO] [stdout] | [INFO] [stdout] 378 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:53 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:382:55 [INFO] [stdout] | [INFO] [stdout] 382 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:56 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:385:58 [INFO] [stdout] | [INFO] [stdout] 385 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:55 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:388:57 [INFO] [stdout] | [INFO] [stdout] 388 | cache::set_jni_exception_occured(Some((**jni_environment).v1_6.ExceptionOccurred)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:53 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:391:55 [INFO] [stdout] | [INFO] [stdout] 391 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:54 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:394:56 [INFO] [stdout] | [INFO] [stdout] 394 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:55 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:397:57 [INFO] [stdout] | [INFO] [stdout] 397 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:52 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:400:54 [INFO] [stdout] | [INFO] [stdout] 400 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:227:5 [INFO] [stdout] | [INFO] [stdout] 227 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:59 [INFO] [stdout] | [INFO] [stdout] 403 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:403:61 [WARN] too many lines in the log, truncating it