[INFO] fetching crate j4rs-171h 0.18.1... [INFO] checking j4rs-171h-0.18.1 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate j4rs-171h 0.18.1 into /workspace/builds/worker-3-tc2/source [INFO] validating manifest of crates.io crate j4rs-171h 0.18.1 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate j4rs-171h 0.18.1 [INFO] finished tweaking crates.io crate j4rs-171h 0.18.1 [INFO] tweaked toml for crates.io crate j4rs-171h 0.18.1 written to /workspace/builds/worker-3-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 167 packages to latest compatible versions [INFO] [stderr] Adding anes v0.1.6 (available: v0.2.0) [INFO] [stderr] Adding async-channel v1.9.0 (available: v2.3.1) [INFO] [stderr] Adding event-listener v2.5.3 (available: v5.3.1) [INFO] [stderr] Adding generic-array v0.14.7 (available: v1.1.0) [INFO] [stderr] Adding hermit-abi v0.3.9 (available: v0.4.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding windows-sys v0.48.0 (available: v0.59.0) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] [stderr] Adding windows-targets v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_msvc v0.48.5 (available: v0.52.6) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 53e39719364e666bce1a56935b2ce53db3e177a282a83dba106cce305fdd3f59 [INFO] running `Command { std: "docker" "start" "-a" "53e39719364e666bce1a56935b2ce53db3e177a282a83dba106cce305fdd3f59", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "53e39719364e666bce1a56935b2ce53db3e177a282a83dba106cce305fdd3f59", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "53e39719364e666bce1a56935b2ce53db3e177a282a83dba106cce305fdd3f59", kill_on_drop: false }` [INFO] [stdout] 53e39719364e666bce1a56935b2ce53db3e177a282a83dba106cce305fdd3f59 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 505767d5daf040c14c007f2e52bafa19caa4fb2d4c853b7a0e399d916793a2a4 [INFO] running `Command { std: "docker" "start" "-a" "505767d5daf040c14c007f2e52bafa19caa4fb2d4c853b7a0e399d916793a2a4", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Compiling unicode-ident v1.0.13 [INFO] [stderr] Compiling autocfg v1.3.0 [INFO] [stderr] Compiling crossbeam-utils v0.8.20 [INFO] [stderr] Checking pin-project-lite v0.2.14 [INFO] [stderr] Compiling libc v0.2.159 [INFO] [stderr] Checking futures-core v0.3.30 [INFO] [stderr] Checking cfg-if v1.0.0 [INFO] [stderr] Checking futures-io v0.3.30 [INFO] [stderr] Compiling typenum v1.17.0 [INFO] [stderr] Compiling version_check v0.9.5 [INFO] [stderr] Checking parking v2.2.1 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Compiling serde v1.0.210 [INFO] [stderr] Checking fastrand v2.1.1 [INFO] [stderr] Compiling generic-array v0.14.7 [INFO] [stderr] Compiling slab v0.4.9 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Checking concurrent-queue v2.5.0 [INFO] [stderr] Checking futures-lite v2.3.0 [INFO] [stderr] Compiling quote v1.0.37 [INFO] [stderr] Checking event-listener v5.3.1 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Checking event-listener-strategy v0.5.2 [INFO] [stderr] Compiling serde_json v1.0.128 [INFO] [stderr] Compiling option-ext v0.2.0 [INFO] [stderr] Checking pin-utils v0.1.0 [INFO] [stderr] Checking futures-sink v0.3.30 [INFO] [stderr] Checking bitflags v2.6.0 [INFO] [stderr] Checking linux-raw-sys v0.4.14 [INFO] [stderr] Checking tracing-core v0.1.32 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Compiling lock_api v0.4.12 [INFO] [stderr] Checking tracing v0.1.40 [INFO] [stderr] Compiling dirs-sys v0.4.1 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking either v1.13.0 [INFO] [stderr] Checking value-bag v1.9.0 [INFO] [stderr] Compiling parking_lot_core v0.9.10 [INFO] [stderr] Checking ryu v1.0.18 [INFO] [stderr] Checking atomic-waker v1.1.2 [INFO] [stderr] Checking futures-task v0.3.30 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking async-task v4.7.1 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling cpufeatures v0.2.14 [INFO] [stderr] Checking piper v0.2.4 [INFO] [stderr] Checking log v0.4.22 [INFO] [stderr] Compiling crypto-common v0.1.6 [INFO] [stderr] Compiling block-buffer v0.10.4 [INFO] [stderr] Compiling java-locator v0.1.7 [INFO] [stderr] Compiling digest v0.10.7 [INFO] [stderr] Compiling dirs v5.0.1 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Checking async-lock v3.4.0 [INFO] [stderr] Compiling sha2 v0.10.8 [INFO] [stderr] Checking async-channel v2.3.1 [INFO] [stderr] Checking half v2.4.1 [INFO] [stderr] Checking plotters-backend v0.3.7 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Checking clap_lex v0.7.2 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Checking scopeguard v1.2.0 [INFO] [stderr] Compiling fs_extra v1.3.0 [INFO] [stderr] Checking anstyle v1.0.8 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking ciborium-ll v0.2.2 [INFO] [stderr] Checking clap_builder v4.5.18 [INFO] [stderr] Checking plotters-svg v0.3.7 [INFO] [stderr] Compiling j4rs-171h v0.18.1 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Checking blocking v1.6.1 [INFO] [stdout] warning: unexpected `cfg` condition value: `javafx` [INFO] [stdout] --> build.rs:52:13 [INFO] [stdout] | [INFO] [stdout] 52 | if cfg!(feature = "javafx") { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `no-runtime-libloading` [INFO] [stdout] = help: consider adding `javafx` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking async-executor v1.13.1 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking event-listener v2.5.3 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking clap v4.5.18 [INFO] [stderr] Checking async-channel v1.9.0 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking parking_lot v0.12.3 [INFO] [stderr] Checking kv-log-macro v1.0.7 [INFO] [stderr] Checking is-terminal v0.4.13 [INFO] [stderr] Checking criterion-plot v0.5.0 [INFO] [stderr] Checking signal-hook-registry v1.4.2 [INFO] [stderr] Checking socket2 v0.5.7 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking mio v1.0.2 [INFO] [stderr] Checking libloading v0.8.5 [INFO] [stderr] Checking bytes v1.7.2 [INFO] [stderr] Checking cesu8 v1.1.0 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking dunce v1.0.5 [INFO] [stderr] Checking oorandom v11.1.4 [INFO] [stderr] Compiling jni-sys-macros v0.1.0 [INFO] [stderr] Compiling async-attributes v1.1.2 [INFO] [stderr] Compiling serde_derive v1.0.210 [INFO] [stderr] Compiling futures-macro v0.3.30 [INFO] [stderr] Compiling tokio-macros v2.4.0 [INFO] [stderr] Checking jni-sys v0.4.0 [INFO] [stderr] Checking polling v3.7.3 [INFO] [stderr] Checking tokio v1.40.0 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Checking async-io v2.3.4 [INFO] [stderr] Checking async-global-executor v2.4.1 [INFO] [stderr] Checking async-std v1.13.0 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Checking futures v0.3.30 [INFO] [stderr] Checking ciborium v0.2.2 [INFO] [stderr] Checking tinytemplate v1.2.1 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking criterion v0.5.1 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `j4rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/api/instance.rs [INFO] [stderr] * src/api/mod.rs [INFO] [stderr] * src/cache.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/cache.rs:223:23 [INFO] [stderr] | [INFO] [stderr] 223 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/instance.rs:177:60 [INFO] [stderr] | [INFO] [stderr] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1522:83 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1531:18 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1539:64 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1545:71 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1554:64 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1564:88 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1573:74 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1580:61 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1587:69 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1593:88 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1599:57 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1625:62 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:139:18 [INFO] [stderr] | [INFO] [stderr] 131 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 139 | let tx = unsafe { Box::from_raw(p) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] error: aborting due to 1 previous error; 14 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:100:3 [INFO] [stdout] | [INFO] [stdout] 100 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 100 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:125:3 [INFO] [stdout] | [INFO] [stdout] 125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:177:60 [INFO] [stdout] | [INFO] [stdout] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1522:83 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1531:18 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1539:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1545:71 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1554:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1564:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1573:74 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1580:61 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1587:69 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1593:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1599:57 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1625:62 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/cache.rs:223:36 [INFO] [stdout] | [INFO] [stdout] 223 | ($opt_name:ident, $do_retrieve:expr, $setter_name:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 223 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:23 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:62 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:54 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:23 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:58 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:56 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:57 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:55 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:56 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:57 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:58 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:56 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:23 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:56 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:23 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:55 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:58 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:55 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:56 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:57 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:54 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:61 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:62 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:24 [INFO] [stdout] | [INFO] [stdout] 305 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:306:25 [INFO] [stdout] | [INFO] [stdout] 306 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:307:25 [INFO] [stdout] | [INFO] [stdout] 307 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:294:17 [INFO] [stdout] | [INFO] [stdout] 294 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 295 | | jni_env, [INFO] [stdout] 296 | | obj, [INFO] [stdout] 297 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:288:1 [INFO] [stdout] | [INFO] [stdout] 288 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:322:17 [INFO] [stdout] | [INFO] [stdout] 322 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 323 | | jni_env, [INFO] [stdout] 324 | | obj, [INFO] [stdout] 325 | | cache::get_short_to_short_method()?, [INFO] [stdout] 326 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:316:1 [INFO] [stdout] | [INFO] [stdout] 316 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:350:17 [INFO] [stdout] | [INFO] [stdout] 350 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 351 | | jni_env, [INFO] [stdout] 352 | | obj, [INFO] [stdout] 353 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 354 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:344:1 [INFO] [stdout] | [INFO] [stdout] 344 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:378:17 [INFO] [stdout] | [INFO] [stdout] 378 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 379 | | jni_env, [INFO] [stdout] 380 | | obj, [INFO] [stdout] 381 | | cache::get_long_to_long_method()?, [INFO] [stdout] 382 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:372:1 [INFO] [stdout] | [INFO] [stdout] 372 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:406:17 [INFO] [stdout] | [INFO] [stdout] 406 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 407 | | jni_env, [INFO] [stdout] 408 | | obj, [INFO] [stdout] 409 | | cache::get_float_to_float_method()?, [INFO] [stdout] 410 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:400:1 [INFO] [stdout] | [INFO] [stdout] 400 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:434:17 [INFO] [stdout] | [INFO] [stdout] 434 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 435 | | jni_env, [INFO] [stdout] 436 | | obj, [INFO] [stdout] 437 | | cache::get_double_to_double_method()?, [INFO] [stdout] 438 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:452:17 [INFO] [stdout] | [INFO] [stdout] 452 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:443:1 [INFO] [stdout] | [INFO] [stdout] 443 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 444 | | obj: jobject, [INFO] [stdout] 445 | | jni_env: *mut JNIEnv, [INFO] [stdout] 446 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:461:13 [INFO] [stdout] | [INFO] [stdout] 461 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 462 | | jvm.jni_env, [INFO] [stdout] 463 | | java_string, [INFO] [stdout] 464 | | ptr::null_mut(), [INFO] [stdout] 465 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:467:5 [INFO] [stdout] | [INFO] [stdout] 467 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:473:13 [INFO] [stdout] | [INFO] [stdout] 473 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 474 | | jni_env, [INFO] [stdout] 475 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 476 | | message_jstring.as_ptr(), [INFO] [stdout] 477 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:471:1 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:136:22 [INFO] [stdout] | [INFO] [stdout] 136 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:126:1 [INFO] [stdout] | [INFO] [stdout] 126 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 127 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 128 | | _class: *const c_void, [INFO] [stdout] 129 | | ptr_address: jlong, [INFO] [stdout] 130 | | stacktrace: jstring, [INFO] [stdout] 131 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:83:8 [INFO] [stdout] | [INFO] [stdout] 83 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 83 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 84 | let p = ptr_address as *mut Sender; [INFO] [stdout] ... [INFO] [stdout] 94 | } [INFO] [stdout] 95 ~ } _ => { [INFO] [stdout] 96 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 97 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:89:12 [INFO] [stdout] | [INFO] [stdout] 89 | if let Err(error) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:94:9 [INFO] [stdout] | [INFO] [stdout] 94 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match result { Err(error) => { [INFO] [stdout] 90 | panic!( [INFO] [stdout] ... [INFO] [stdout] 93 | ); [INFO] [stdout] 94 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:112:8 [INFO] [stdout] | [INFO] [stdout] 112 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 112 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 113 | let p = ptr_address as *mut oneshot::Sender>; [INFO] [stdout] ... [INFO] [stdout] 119 | } [INFO] [stdout] 120 ~ } _ => { [INFO] [stdout] 121 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 122 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:117:12 [INFO] [stdout] | [INFO] [stdout] 117 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:119:9 [INFO] [stdout] | [INFO] [stdout] 119 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 117 ~ match result { Err(_) => { [INFO] [stdout] 118 | panic!("Could not send to the defined callback channel to complete the future"); [INFO] [stdout] 119 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:142:12 [INFO] [stdout] | [INFO] [stdout] 142 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:144:9 [INFO] [stdout] | [INFO] [stdout] 144 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 142 ~ match result { Err(_) => { [INFO] [stdout] 143 | panic!("Could not send to the defined callback channel to fail a future"); [INFO] [stdout] 144 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 111 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating benches/j4rs_benchmark.rs from 2021 edition to 2024 [INFO] [stdout] warning: function `do_instance_creation` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:11:4 [INFO] [stdout] | [INFO] [stdout] 11 | fn do_instance_creation(jvm: &Jvm) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_no_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:16:4 [INFO] [stdout] | [INFO] [stdout] 16 | fn do_invocation_w_no_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_string_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:20:4 [INFO] [stdout] | [INFO] [stdout] 20 | fn do_invocation_w_string_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_integer_args` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:29:4 [INFO] [stdout] | [INFO] [stdout] 29 | fn do_invocation_w_integer_args(jvm: &Jvm, instance: &Instance) -> Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `do_invocation_w_string_args_and_to_rust` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:38:4 [INFO] [stdout] | [INFO] [stdout] 38 | fn do_invocation_w_string_args_and_to_rust(jvm: &Jvm, instance: &Instance) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `j4rs_benchmark` is never used [INFO] [stdout] --> benches/j4rs_benchmark.rs:89:4 [INFO] [stdout] | [INFO] [stdout] 89 | fn j4rs_benchmark(c: &mut Criterion) { [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 6 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `j4rs` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/api/instance.rs [INFO] [stderr] * src/api/mod.rs [INFO] [stderr] * src/cache.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/cache.rs:223:23 [INFO] [stderr] | [INFO] [stderr] 223 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/instance.rs:177:60 [INFO] [stderr] | [INFO] [stderr] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1522:83 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1531:18 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1539:64 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1545:71 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1554:64 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1564:88 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1573:74 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1580:61 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1587:69 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1593:88 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1599:57 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/api/mod.rs:1625:62 [INFO] [stderr] | [INFO] [stderr] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stderr] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/lib.rs:139:18 [INFO] [stderr] | [INFO] [stderr] 131 | ) { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 139 | let tx = unsafe { Box::from_raw(p) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:100:3 [INFO] [stdout] | [INFO] [stdout] 100 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 100 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: aborting due to 1 previous error; 14 warnings emitted [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:125:3 [INFO] [stdout] | [INFO] [stdout] 125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:177:60 [INFO] [stdout] | [INFO] [stdout] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1522:83 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Original diagnostics will follow. [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1531:18 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1539:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1545:71 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1554:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1564:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1573:74 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1580:61 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1587:69 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1593:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1599:57 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1625:62 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/cache.rs:223:36 [INFO] [stdout] | [INFO] [stdout] 223 | ($opt_name:ident, $do_retrieve:expr, $setter_name:ident) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 223 | ($opt_name:ident, $do_retrieve:expr_2021, $setter_name:ident) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:23 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:62 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:54 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:23 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:58 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:56 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:57 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:55 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:56 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:57 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:58 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:56 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:23 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:56 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:23 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:55 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:58 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:55 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:56 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:57 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:54 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:61 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:62 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:24 [INFO] [stdout] | [INFO] [stdout] 305 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:306:25 [INFO] [stdout] | [INFO] [stdout] 306 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:307:25 [INFO] [stdout] | [INFO] [stdout] 307 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:294:17 [INFO] [stdout] | [INFO] [stdout] 294 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 295 | | jni_env, [INFO] [stdout] 296 | | obj, [INFO] [stdout] 297 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:288:1 [INFO] [stdout] | [INFO] [stdout] 288 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:322:17 [INFO] [stdout] | [INFO] [stdout] 322 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 323 | | jni_env, [INFO] [stdout] 324 | | obj, [INFO] [stdout] 325 | | cache::get_short_to_short_method()?, [INFO] [stdout] 326 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:316:1 [INFO] [stdout] | [INFO] [stdout] 316 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:350:17 [INFO] [stdout] | [INFO] [stdout] 350 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 351 | | jni_env, [INFO] [stdout] 352 | | obj, [INFO] [stdout] 353 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 354 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:344:1 [INFO] [stdout] | [INFO] [stdout] 344 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:378:17 [INFO] [stdout] | [INFO] [stdout] 378 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 379 | | jni_env, [INFO] [stdout] 380 | | obj, [INFO] [stdout] 381 | | cache::get_long_to_long_method()?, [INFO] [stdout] 382 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:372:1 [INFO] [stdout] | [INFO] [stdout] 372 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:406:17 [INFO] [stdout] | [INFO] [stdout] 406 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 407 | | jni_env, [INFO] [stdout] 408 | | obj, [INFO] [stdout] 409 | | cache::get_float_to_float_method()?, [INFO] [stdout] 410 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:400:1 [INFO] [stdout] | [INFO] [stdout] 400 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:434:17 [INFO] [stdout] | [INFO] [stdout] 434 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 435 | | jni_env, [INFO] [stdout] 436 | | obj, [INFO] [stdout] 437 | | cache::get_double_to_double_method()?, [INFO] [stdout] 438 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:452:17 [INFO] [stdout] | [INFO] [stdout] 452 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:443:1 [INFO] [stdout] | [INFO] [stdout] 443 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 444 | | obj: jobject, [INFO] [stdout] 445 | | jni_env: *mut JNIEnv, [INFO] [stdout] 446 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:461:13 [INFO] [stdout] | [INFO] [stdout] 461 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 462 | | jvm.jni_env, [INFO] [stdout] 463 | | java_string, [INFO] [stdout] 464 | | ptr::null_mut(), [INFO] [stdout] 465 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:467:5 [INFO] [stdout] | [INFO] [stdout] 467 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:473:13 [INFO] [stdout] | [INFO] [stdout] 473 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 474 | | jni_env, [INFO] [stdout] 475 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 476 | | message_jstring.as_ptr(), [INFO] [stdout] 477 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:471:1 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:136:22 [INFO] [stdout] | [INFO] [stdout] 136 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:126:1 [INFO] [stdout] | [INFO] [stdout] 126 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 127 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 128 | | _class: *const c_void, [INFO] [stdout] 129 | | ptr_address: jlong, [INFO] [stdout] 130 | | stacktrace: jstring, [INFO] [stdout] 131 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:83:8 [INFO] [stdout] | [INFO] [stdout] 83 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 83 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 84 | let p = ptr_address as *mut Sender; [INFO] [stdout] ... [INFO] [stdout] 94 | } [INFO] [stdout] 95 ~ } _ => { [INFO] [stdout] 96 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 97 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:89:12 [INFO] [stdout] | [INFO] [stdout] 89 | if let Err(error) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:94:9 [INFO] [stdout] | [INFO] [stdout] 94 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 89 ~ match result { Err(error) => { [INFO] [stdout] 90 | panic!( [INFO] [stdout] ... [INFO] [stdout] 93 | ); [INFO] [stdout] 94 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:112:8 [INFO] [stdout] | [INFO] [stdout] 112 | if let Ok(instance) = instance_res { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:120:5 [INFO] [stdout] | [INFO] [stdout] 120 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 112 ~ match instance_res { Ok(instance) => { [INFO] [stdout] 113 | let p = ptr_address as *mut oneshot::Sender>; [INFO] [stdout] ... [INFO] [stdout] 119 | } [INFO] [stdout] 120 ~ } _ => { [INFO] [stdout] 121 | panic!("Could not create Rust Instance from the Java Instance object..."); [INFO] [stdout] 122 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:117:12 [INFO] [stdout] | [INFO] [stdout] 117 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:119:9 [INFO] [stdout] | [INFO] [stdout] 119 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 117 ~ match result { Err(_) => { [INFO] [stdout] 118 | panic!("Could not send to the defined callback channel to complete the future"); [INFO] [stdout] 119 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/lib.rs:142:12 [INFO] [stdout] | [INFO] [stdout] 142 | if let Err(_) = result { [INFO] [stdout] | ^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/lib.rs:144:9 [INFO] [stdout] | [INFO] [stdout] 144 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 142 ~ match result { Err(_) => { [INFO] [stdout] 143 | panic!("Could not send to the defined callback channel to fail a future"); [INFO] [stdout] 144 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 111 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 12.37s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Compiling j4rs-171h v0.18.1 (/tmp/fixit) [INFO] [stdout] warning: unexpected `cfg` condition value: `javafx` [INFO] [stdout] --> build.rs:52:13 [INFO] [stdout] | [INFO] [stdout] 52 | if cfg!(feature = "javafx") { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `no-runtime-libloading` [INFO] [stdout] = help: consider adding `javafx` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:100:3 [INFO] [stdout] | [INFO] [stdout] 100 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 100 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:125:3 [INFO] [stdout] | [INFO] [stdout] 125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:100:3 [INFO] [stdout] | [INFO] [stdout] 100 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 100 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:125:3 [INFO] [stdout] | [INFO] [stdout] 125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:177:60 [INFO] [stdout] | [INFO] [stdout] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1522:83 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1531:18 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1539:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1545:71 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1554:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1564:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1573:74 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1580:61 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1587:69 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1593:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1599:57 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1625:62 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/instance.rs:177:60 [INFO] [stdout] | [INFO] [stdout] 176 | impl<'a> ChainableInstance<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] 177 | pub(crate) fn new(instance: Instance, jvm: &'a Jvm) -> ChainableInstance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1522:83 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1522 | pub fn classpath_entry(&'a mut self, cp_entry: ClasspathEntry<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1531:18 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1531 | ) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1539:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1539 | pub fn java_opt(&'a mut self, opt: JavaOpt<'a>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1545:71 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1545 | pub fn java_opts(&'a mut self, opts: Vec>) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1554:64 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1554 | pub fn with_no_implicit_classpath(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1564:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1564 | pub fn detach_thread_on_drop(&'a mut self, detach_thread_on_drop: bool) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1573:74 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1573 | pub fn with_native_lib_name(&'a mut self, lib_name: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1580:61 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1580 | pub fn skip_setting_native_lib(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1587:69 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1587 | pub fn with_base_path(&'a mut self, base_path: &str) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1593:88 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1593 | pub fn with_maven_settings(&'a mut self, maven_settings: MavenSettings) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1599:57 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1599 | pub fn with_javafx_support(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/api/mod.rs:1625:62 [INFO] [stdout] | [INFO] [stdout] 1504 | impl<'a> JvmBuilder<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 1625 | pub fn with_default_classloader(&'a mut self) -> &'a mut JvmBuilder { [INFO] [stdout] | ^^^^^^^^^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:23 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:62 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:54 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:23 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:58 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:56 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:57 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:55 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:56 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:57 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:58 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:56 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:23 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:56 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:23 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:55 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:58 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:55 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:56 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:57 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:54 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:61 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:62 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:24 [INFO] [stdout] | [INFO] [stdout] 305 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:306:25 [INFO] [stdout] | [INFO] [stdout] 306 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:307:25 [INFO] [stdout] | [INFO] [stdout] 307 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:294:17 [INFO] [stdout] | [INFO] [stdout] 294 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 295 | | jni_env, [INFO] [stdout] 296 | | obj, [INFO] [stdout] 297 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:288:1 [INFO] [stdout] | [INFO] [stdout] 288 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:322:17 [INFO] [stdout] | [INFO] [stdout] 322 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 323 | | jni_env, [INFO] [stdout] 324 | | obj, [INFO] [stdout] 325 | | cache::get_short_to_short_method()?, [INFO] [stdout] 326 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:316:1 [INFO] [stdout] | [INFO] [stdout] 316 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:350:17 [INFO] [stdout] | [INFO] [stdout] 350 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 351 | | jni_env, [INFO] [stdout] 352 | | obj, [INFO] [stdout] 353 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 354 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:344:1 [INFO] [stdout] | [INFO] [stdout] 344 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:378:17 [INFO] [stdout] | [INFO] [stdout] 378 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 379 | | jni_env, [INFO] [stdout] 380 | | obj, [INFO] [stdout] 381 | | cache::get_long_to_long_method()?, [INFO] [stdout] 382 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:372:1 [INFO] [stdout] | [INFO] [stdout] 372 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:406:17 [INFO] [stdout] | [INFO] [stdout] 406 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 407 | | jni_env, [INFO] [stdout] 408 | | obj, [INFO] [stdout] 409 | | cache::get_float_to_float_method()?, [INFO] [stdout] 410 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:400:1 [INFO] [stdout] | [INFO] [stdout] 400 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:51 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:221:53 [INFO] [stdout] | [INFO] [stdout] 221 | cache::set_jni_get_method_id(Some((**jni_environment).v1_6.GetMethodID)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:21 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:225:23 [INFO] [stdout] | [INFO] [stdout] 225 | (**jni_environment).v1_6.GetStaticMethodID, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:60 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:229:62 [INFO] [stdout] | [INFO] [stdout] 229 | .or_else(|| cache::set_jni_new_object(Some((**jni_environment).v1_6.NewObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:434:17 [INFO] [stdout] | [INFO] [stdout] 434 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 435 | | jni_env, [INFO] [stdout] 436 | | obj, [INFO] [stdout] 437 | | cache::get_double_to_double_method()?, [INFO] [stdout] 438 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:52 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:452:17 [INFO] [stdout] | [INFO] [stdout] 452 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:443:1 [INFO] [stdout] | [INFO] [stdout] 443 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 444 | | obj: jobject, [INFO] [stdout] 445 | | jni_env: *mut JNIEnv, [INFO] [stdout] 446 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:231:54 [INFO] [stdout] | [INFO] [stdout] 231 | cache::set_jni_new_string_utf(Some((**jni_environment).v1_6.NewStringUTF)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:21 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:235:23 [INFO] [stdout] | [INFO] [stdout] 235 | (**jni_environment).v1_6.GetStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:21 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:240:23 [INFO] [stdout] | [INFO] [stdout] 240 | (**jni_environment).v1_6.ReleaseStringUTFChars, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:56 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:244:58 [INFO] [stdout] | [INFO] [stdout] 244 | cache::set_jni_call_object_method(Some((**jni_environment).v1_6.CallObjectMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:54 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:247:56 [INFO] [stdout] | [INFO] [stdout] 247 | cache::set_jni_call_byte_method(Some((**jni_environment).v1_6.CallByteMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:55 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:250:57 [INFO] [stdout] | [INFO] [stdout] 250 | cache::set_jni_call_short_method(Some((**jni_environment).v1_6.CallShortMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:461:13 [INFO] [stdout] | [INFO] [stdout] 461 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 462 | | jvm.jni_env, [INFO] [stdout] 463 | | java_string, [INFO] [stdout] 464 | | ptr::null_mut(), [INFO] [stdout] 465 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:467:5 [INFO] [stdout] | [INFO] [stdout] 467 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:53 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:253:55 [INFO] [stdout] | [INFO] [stdout] 253 | cache::set_jni_call_int_method(Some((**jni_environment).v1_6.CallIntMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:473:13 [INFO] [stdout] | [INFO] [stdout] 473 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 474 | | jni_env, [INFO] [stdout] 475 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 476 | | message_jstring.as_ptr(), [INFO] [stdout] 477 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:471:1 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:54 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:256:56 [INFO] [stdout] | [INFO] [stdout] 256 | cache::set_jni_call_long_method(Some((**jni_environment).v1_6.CallLongMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:55 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:259:57 [INFO] [stdout] | [INFO] [stdout] 259 | cache::set_jni_call_float_method(Some((**jni_environment).v1_6.CallFloatMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:56 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:262:58 [INFO] [stdout] | [INFO] [stdout] 262 | cache::set_jni_call_double_method(Some((**jni_environment).v1_6.CallDoubleMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:54 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:265:56 [INFO] [stdout] | [INFO] [stdout] 265 | cache::set_jni_call_void_method(Some((**jni_environment).v1_6.CallVoidMethod)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:21 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:269:23 [INFO] [stdout] | [INFO] [stdout] 269 | (**jni_environment).v1_6.CallStaticObjectMethod, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:54 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:273:56 [INFO] [stdout] | [INFO] [stdout] 273 | cache::set_jni_new_object_array(Some((**jni_environment).v1_6.NewObjectArray)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:21 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:277:23 [INFO] [stdout] | [INFO] [stdout] 277 | (**jni_environment).v1_6.SetObjectArrayElement, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:53 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:281:55 [INFO] [stdout] | [INFO] [stdout] 281 | cache::set_jni_exception_check(Some((**jni_environment).v1_6.ExceptionCheck)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:56 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:284:58 [INFO] [stdout] | [INFO] [stdout] 284 | cache::set_jni_exception_describe(Some((**jni_environment).v1_6.ExceptionDescribe)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:53 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:287:55 [INFO] [stdout] | [INFO] [stdout] 287 | cache::set_jni_exception_clear(Some((**jni_environment).v1_6.ExceptionClear)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:54 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:290:56 [INFO] [stdout] | [INFO] [stdout] 290 | cache::set_jni_delete_local_ref(Some((**jni_environment).v1_6.DeleteLocalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:55 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:293:57 [INFO] [stdout] | [INFO] [stdout] 293 | cache::set_jni_delete_global_ref(Some((**jni_environment).v1_6.DeleteGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:52 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:296:54 [INFO] [stdout] | [INFO] [stdout] 296 | cache::set_jni_new_global_ref(Some((**jni_environment).v1_6.NewGlobalRef)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:59 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:299:61 [INFO] [stdout] | [INFO] [stdout] 299 | .or_else(|| cache::set_jni_throw_new(Some((**jni_environment).v1_6.ThrowNew))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:60 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:301:62 [INFO] [stdout] | [INFO] [stdout] 301 | .or_else(|| cache::set_is_same_object(Some((**jni_environment).v1_6.IsSameObject))); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:305:24 [INFO] [stdout] | [INFO] [stdout] 305 | if (ec)(jni_environment) == JNI_TRUE { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/api/mod.rs:217:5 [INFO] [stdout] | [INFO] [stdout] 217 | pub unsafe fn try_from(jni_environment: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:306:25 [INFO] [stdout] | [INFO] [stdout] 306 | (ed)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/api/mod.rs:307:25 [INFO] [stdout] | [INFO] [stdout] 307 | (exclear)(jni_environment); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:136:22 [INFO] [stdout] | [INFO] [stdout] 136 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:126:1 [INFO] [stdout] | [INFO] [stdout] 126 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 127 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 128 | | _class: *const c_void, [INFO] [stdout] 129 | | ptr_address: jlong, [INFO] [stdout] 130 | | stacktrace: jstring, [INFO] [stdout] 131 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 3 previous errors; 102 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `j4rs-171h` (lib) due to 4 previous errors; 102 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:294:17 [INFO] [stdout] | [INFO] [stdout] 294 | let v = (opt_to_res(cache::get_jni_call_byte_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 295 | | jni_env, [INFO] [stdout] 296 | | obj, [INFO] [stdout] 297 | | cache::get_byte_to_byte_method()?, [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:288:1 [INFO] [stdout] | [INFO] [stdout] 288 | pub(crate) unsafe fn i8_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:322:17 [INFO] [stdout] | [INFO] [stdout] 322 | let v = (opt_to_res(cache::get_jni_call_short_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 323 | | jni_env, [INFO] [stdout] 324 | | obj, [INFO] [stdout] 325 | | cache::get_short_to_short_method()?, [INFO] [stdout] 326 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:316:1 [INFO] [stdout] | [INFO] [stdout] 316 | pub(crate) unsafe fn i16_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:350:17 [INFO] [stdout] | [INFO] [stdout] 350 | let v = (opt_to_res(cache::get_jni_call_int_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 351 | | jni_env, [INFO] [stdout] 352 | | obj, [INFO] [stdout] 353 | | cache::get_integer_to_int_method()?, [INFO] [stdout] 354 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:344:1 [INFO] [stdout] | [INFO] [stdout] 344 | pub(crate) unsafe fn i32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:378:17 [INFO] [stdout] | [INFO] [stdout] 378 | let v = (opt_to_res(cache::get_jni_call_long_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 379 | | jni_env, [INFO] [stdout] 380 | | obj, [INFO] [stdout] 381 | | cache::get_long_to_long_method()?, [INFO] [stdout] 382 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:372:1 [INFO] [stdout] | [INFO] [stdout] 372 | pub(crate) unsafe fn i64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:406:17 [INFO] [stdout] | [INFO] [stdout] 406 | let v = (opt_to_res(cache::get_jni_call_float_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 407 | | jni_env, [INFO] [stdout] 408 | | obj, [INFO] [stdout] 409 | | cache::get_float_to_float_method()?, [INFO] [stdout] 410 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:400:1 [INFO] [stdout] | [INFO] [stdout] 400 | pub(crate) unsafe fn f32_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:434:17 [INFO] [stdout] | [INFO] [stdout] 434 | let v = (opt_to_res(cache::get_jni_call_double_method())?)( [INFO] [stdout] | _________________^ [INFO] [stdout] 435 | | jni_env, [INFO] [stdout] 436 | | obj, [INFO] [stdout] 437 | | cache::get_double_to_double_method()?, [INFO] [stdout] 438 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:428:1 [INFO] [stdout] | [INFO] [stdout] 428 | pub(crate) unsafe fn f64_from_jobject(obj: jobject, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:452:17 [INFO] [stdout] | [INFO] [stdout] 452 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)(jni_env, obj, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:443:1 [INFO] [stdout] | [INFO] [stdout] 443 | / pub(crate) unsafe fn string_from_jobject( [INFO] [stdout] 444 | | obj: jobject, [INFO] [stdout] 445 | | jni_env: *mut JNIEnv, [INFO] [stdout] 446 | | ) -> errors::Result { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:461:13 [INFO] [stdout] | [INFO] [stdout] 461 | let s = (opt_to_res(cache::get_jni_get_string_utf_chars())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 462 | | jvm.jni_env, [INFO] [stdout] 463 | | java_string, [INFO] [stdout] 464 | | ptr::null_mut(), [INFO] [stdout] 465 | | ) as *mut c_char; [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | pub unsafe fn jstring_to_rust_string(jvm: &Jvm, java_string: jstring) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:467:5 [INFO] [stdout] | [INFO] [stdout] 467 | (opt_to_res(cache::get_jni_release_string_utf_chars())?)(jvm.jni_env, java_string, s); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jni_utils.rs:473:13 [INFO] [stdout] | [INFO] [stdout] 473 | let i = (opt_to_res(cache::get_jni_throw_new())?)( [INFO] [stdout] | _____________^ [INFO] [stdout] 474 | | jni_env, [INFO] [stdout] 475 | | cache::get_invocation_exception_class()?, [INFO] [stdout] 476 | | message_jstring.as_ptr(), [INFO] [stdout] 477 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jni_utils.rs:471:1 [INFO] [stdout] | [INFO] [stdout] 471 | pub(crate) unsafe fn throw_exception(message: &str, jni_env: *mut JNIEnv) -> errors::Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jni_utils::jstring_to_rust_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/lib.rs:136:22 [INFO] [stdout] | [INFO] [stdout] 136 | let stacktrace = jstring_to_rust_string(&jvm, stacktrace); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/lib.rs:126:1 [INFO] [stdout] | [INFO] [stdout] 126 | / pub unsafe extern "C" fn Java_org_astonbitecode_j4rs_api_invocation_NativeCallbackToRustFutureSupport_failcallbacktochannel( [INFO] [stdout] 127 | | _jni_env: *mut JNIEnv, [INFO] [stdout] 128 | | _class: *const c_void, [INFO] [stdout] 129 | | ptr_address: jlong, [INFO] [stdout] 130 | | stacktrace: jstring, [INFO] [stdout] 131 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 3 previous errors; 102 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `j4rs-171h` (lib test) due to 4 previous errors; 102 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "505767d5daf040c14c007f2e52bafa19caa4fb2d4c853b7a0e399d916793a2a4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "505767d5daf040c14c007f2e52bafa19caa4fb2d4c853b7a0e399d916793a2a4", kill_on_drop: false }` [INFO] [stdout] 505767d5daf040c14c007f2e52bafa19caa4fb2d4c853b7a0e399d916793a2a4