[INFO] fetching crate madsim-rdkafka 0.4.2+0.34.0... [INFO] checking madsim-rdkafka-0.4.2+0.34.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate madsim-rdkafka 0.4.2+0.34.0 into /workspace/builds/worker-1-tc2/source [INFO] validating manifest of crates.io crate madsim-rdkafka 0.4.2+0.34.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate madsim-rdkafka 0.4.2+0.34.0 [INFO] finished tweaking crates.io crate madsim-rdkafka 0.4.2+0.34.0 [INFO] tweaked toml for crates.io crate madsim-rdkafka 0.4.2+0.34.0 written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Locking 247 packages to latest compatible versions [INFO] [stderr] Adding async-channel v1.9.0 (available: v2.3.1) [INFO] [stderr] Adding async-fs v1.6.0 (available: v2.1.2) [INFO] [stderr] Adding async-io v1.13.0 (available: v2.3.4) [INFO] [stderr] Adding async-lock v2.8.0 (available: v3.4.0) [INFO] [stderr] Adding async-net v1.8.0 (available: v2.0.0) [INFO] [stderr] Adding async-process v1.8.1 (available: v2.3.0) [INFO] [stderr] Adding autocfg v0.1.8 (available: v1.3.0) [INFO] [stderr] Adding backoff v0.1.6 (available: v0.4.0) [INFO] [stderr] Adding base64 v0.21.7 (available: v0.22.1) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding clap v2.34.0 (available: v4.5.18) [INFO] [stderr] Adding cloudabi v0.0.3 (available: v0.1.0) [INFO] [stderr] Adding darling v0.14.4 (available: v0.20.10) [INFO] [stderr] Adding darling_core v0.14.4 (available: v0.20.10) [INFO] [stderr] Adding darling_macro v0.14.4 (available: v0.20.10) [INFO] [stderr] Adding env_logger v0.9.3 (available: v0.11.5) [INFO] [stderr] Adding event-listener v2.5.3 (available: v5.3.1) [INFO] [stderr] Adding event-listener v3.1.0 (available: v5.3.1) [INFO] [stderr] Adding fastrand v1.9.0 (available: v2.1.1) [INFO] [stderr] Adding futures-lite v1.13.0 (available: v2.3.0) [INFO] [stderr] Adding hermit-abi v0.1.19 (available: v0.4.0) [INFO] [stderr] Adding hermit-abi v0.3.9 (available: v0.4.0) [INFO] [stderr] Adding io-lifetimes v1.0.11 (available: v2.0.3) [INFO] [stderr] Adding linux-raw-sys v0.3.8 (available: v0.6.5) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding nu-ansi-term v0.46.0 (available: v0.50.1) [INFO] [stderr] Adding num_enum v0.5.11 (available: v0.7.3) [INFO] [stderr] Adding num_enum_derive v0.5.11 (available: v0.7.3) [INFO] [stderr] Adding polling v2.8.0 (available: v3.7.3) [INFO] [stderr] Adding proc-macro-crate v1.3.1 (available: v3.2.0) [INFO] [stderr] Adding rand v0.3.23 (available: v0.8.5) [INFO] [stderr] Adding rand v0.4.6 (available: v0.8.5) [INFO] [stderr] Adding rand v0.6.5 (available: v0.8.5) [INFO] [stderr] Adding rand_chacha v0.1.1 (available: v0.3.1) [INFO] [stderr] Adding rand_core v0.3.1 (available: v0.6.4) [INFO] [stderr] Adding rand_core v0.4.2 (available: v0.6.4) [INFO] [stderr] Adding rand_hc v0.1.0 (available: v0.3.2) [INFO] [stderr] Adding rand_isaac v0.1.1 (available: v0.3.0) [INFO] [stderr] Adding rand_jitter v0.1.4 (available: v0.4.0) [INFO] [stderr] Adding rand_os v0.1.3 (available: v0.2.2) [INFO] [stderr] Adding rand_pcg v0.1.2 (available: v0.3.1) [INFO] [stderr] Adding rand_xorshift v0.1.1 (available: v0.3.0) [INFO] [stderr] Adding rdrand v0.4.0 (available: v0.8.3) [INFO] [stderr] Adding rustix v0.37.27 (available: v0.38.37) [INFO] [stderr] Adding smol v1.3.0 (available: v2.0.2) [INFO] [stderr] Adding socket2 v0.4.10 (available: v0.5.7) [INFO] [stderr] Adding strsim v0.8.0 (available: v0.11.1) [INFO] [stderr] Adding strsim v0.10.0 (available: v0.11.1) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding textwrap v0.11.0 (available: v0.16.1) [INFO] [stderr] Adding toml_edit v0.19.15 (available: v0.22.22) [INFO] [stderr] Adding unicode-width v0.1.14 (available: v0.2.0) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding windows-core v0.52.0 (available: v0.58.0) [INFO] [stderr] Adding windows-sys v0.48.0 (available: v0.59.0) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] [stderr] Adding windows-targets v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_aarch64_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_i686_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnu v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_gnullvm v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding windows_x86_64_msvc v0.48.5 (available: v0.52.6) [INFO] [stderr] Adding winnow v0.5.40 (available: v0.6.20) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] f99975466ea0ba981e84269b232fb6d4ddfe9800b62f520ffda5304b4b225929 [INFO] running `Command { std: "docker" "start" "-a" "f99975466ea0ba981e84269b232fb6d4ddfe9800b62f520ffda5304b4b225929", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "f99975466ea0ba981e84269b232fb6d4ddfe9800b62f520ffda5304b4b225929", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f99975466ea0ba981e84269b232fb6d4ddfe9800b62f520ffda5304b4b225929", kill_on_drop: false }` [INFO] [stdout] f99975466ea0ba981e84269b232fb6d4ddfe9800b62f520ffda5304b4b225929 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6a6834b7acb0adf332b6b9d63eea93f99f463f29aaa234e131a8c03f6c9a8883 [INFO] running `Command { std: "docker" "start" "-a" "6a6834b7acb0adf332b6b9d63eea93f99f463f29aaa234e131a8c03f6c9a8883", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (3 fixes) [INFO] [stderr] Checking pin-project-lite v0.2.14 [INFO] [stderr] Compiling crossbeam-utils v0.8.20 [INFO] [stderr] Checking futures-core v0.3.30 [INFO] [stderr] Checking parking v2.2.1 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking futures-io v0.3.30 [INFO] [stderr] Compiling slab v0.4.9 [INFO] [stderr] Checking fastrand v2.1.1 [INFO] [stderr] Compiling autocfg v0.1.8 [INFO] [stderr] Checking rand_core v0.4.2 [INFO] [stderr] Checking value-bag v1.9.0 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Checking tracing-core v0.1.32 [INFO] [stderr] Checking event-listener v2.5.3 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Checking linux-raw-sys v0.4.14 [INFO] [stderr] Checking bitflags v2.6.0 [INFO] [stderr] Compiling pkg-config v0.3.31 [INFO] [stderr] Checking async-task v4.7.1 [INFO] [stderr] Compiling equivalent v1.0.1 [INFO] [stderr] Checking atomic-waker v1.1.2 [INFO] [stderr] Compiling io-lifetimes v1.0.11 [INFO] [stderr] Checking futures-lite v2.3.0 [INFO] [stderr] Compiling hashbrown v0.14.5 [INFO] [stderr] Compiling shlex v1.3.0 [INFO] [stderr] Checking log v0.4.22 [INFO] [stderr] Checking piper v0.2.4 [INFO] [stderr] Checking rand_core v0.3.1 [INFO] [stderr] Compiling cc v1.1.21 [INFO] [stderr] Compiling polling v2.8.0 [INFO] [stderr] Checking tracing v0.1.40 [INFO] [stderr] Checking fastrand v1.9.0 [INFO] [stderr] Compiling winnow v0.5.40 [INFO] [stderr] Compiling toml_datetime v0.6.8 [INFO] [stderr] Compiling rustix v0.37.27 [INFO] [stderr] Checking waker-fn v1.2.0 [INFO] [stderr] Compiling vcpkg v0.2.15 [INFO] [stderr] Checking async-lock v2.8.0 [INFO] [stderr] Checking futures-lite v1.13.0 [INFO] [stderr] Compiling async-io v1.13.0 [INFO] [stderr] Checking concurrent-queue v2.5.0 [INFO] [stderr] Checking pin-utils v0.1.0 [INFO] [stderr] Checking linux-raw-sys v0.3.8 [INFO] [stderr] Checking futures-sink v0.3.30 [INFO] [stderr] Compiling once_cell v1.19.0 [INFO] [stderr] Checking futures-channel v0.3.30 [INFO] [stderr] Checking event-listener v5.3.1 [INFO] [stderr] Compiling indexmap v2.5.0 [INFO] [stderr] Compiling rand_pcg v0.1.2 [INFO] [stderr] Compiling rand_chacha v0.1.1 [INFO] [stderr] Checking socket2 v0.4.10 [INFO] [stderr] Compiling serde v1.0.210 [INFO] [stderr] Checking futures-task v0.3.30 [INFO] [stderr] Checking async-executor v1.13.1 [INFO] [stderr] Checking event-listener-strategy v0.5.2 [INFO] [stderr] Compiling rdkafka-sys v4.7.0+2.3.0 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Compiling rand v0.6.5 [INFO] [stderr] Checking async-lock v3.4.0 [INFO] [stderr] Checking async-channel v2.3.1 [INFO] [stderr] Checking signal-hook-registry v1.4.2 [INFO] [stderr] Compiling async-fs v1.6.0 [INFO] [stderr] Compiling serde_json v1.0.128 [INFO] [stderr] Checking blocking v1.6.1 [INFO] [stderr] Checking adler2 v2.0.0 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Checking miniz_oxide v0.8.0 [INFO] [stderr] Checking event-listener v3.1.0 [INFO] [stderr] Checking async-channel v1.9.0 [INFO] [stderr] Checking rand_isaac v0.1.1 [INFO] [stderr] Checking rand_hc v0.1.0 [INFO] [stderr] Checking rand_xorshift v0.1.1 [INFO] [stderr] Checking rand_os v0.1.3 [INFO] [stderr] Checking rand_jitter v0.1.4 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking crc32fast v1.4.2 [INFO] [stderr] Checking unicode-width v0.1.14 [INFO] [stderr] Checking itoa v1.0.11 [INFO] [stderr] Checking ryu v1.0.18 [INFO] [stderr] Checking nom v7.1.3 [INFO] [stderr] Checking crossbeam-channel v0.5.13 [INFO] [stderr] Checking kv-log-macro v1.0.7 [INFO] [stderr] Checking rand v0.4.6 [INFO] [stderr] Checking flate2 v1.0.33 [INFO] [stderr] Checking instant v0.1.13 [INFO] [stderr] Checking textwrap v0.11.0 [INFO] [stderr] Checking iana-time-zone v0.1.61 [INFO] [stderr] Compiling libz-sys v1.1.20 [INFO] [stderr] Checking base64 v0.21.7 [INFO] [stderr] Checking humantime v2.1.0 [INFO] [stderr] Checking termcolor v1.4.1 [INFO] [stderr] Checking clap v2.34.0 [INFO] [stderr] Checking chrono v0.4.38 [INFO] [stderr] Checking maplit v1.0.2 [INFO] [stderr] Checking rand v0.3.23 [INFO] [stderr] Compiling toml_edit v0.19.15 [INFO] [stderr] Checking backoff v0.1.6 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Compiling futures-macro v0.3.30 [INFO] [stderr] Compiling serde_derive v1.0.210 [INFO] [stderr] Compiling tokio-macros v2.4.0 [INFO] [stderr] Compiling async-trait v0.1.83 [INFO] [stderr] Checking hdrhistogram v7.5.4 [INFO] [stderr] Compiling async-attributes v1.1.2 [INFO] [stderr] Checking async-net v1.8.0 [INFO] [stderr] Checking tokio v1.40.0 [INFO] [stderr] Compiling proc-macro-crate v1.3.1 [INFO] [stderr] Checking futures-util v0.3.30 [INFO] [stderr] Compiling num_enum_derive v0.5.11 [INFO] [stderr] Checking polling v3.7.3 [INFO] [stderr] Checking num_enum v0.5.11 [INFO] [stderr] Checking async-io v2.3.4 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking async-signal v0.2.10 [INFO] [stderr] Checking async-global-executor v2.4.1 [INFO] [stderr] Checking env_logger v0.9.3 [INFO] [stderr] Checking async-process v1.8.1 [INFO] [stderr] Checking async-std v1.13.0 [INFO] [stderr] Checking smol v1.3.0 [INFO] [stderr] Checking futures-executor v0.3.30 [INFO] [stderr] Checking futures v0.3.30 [INFO] [stderr] Checking madsim-rdkafka v0.4.2+0.34.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `madsim_rdkafka` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/std/admin.rs [INFO] [stderr] * src/std/client.rs [INFO] [stderr] * src/std/message.rs [INFO] [stderr] * src/std/mocking.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/std/message.rs:813:8 [INFO] [stderr] | [INFO] [stderr] 813 | ($($N:expr_2021)+) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/std/mocking.rs:77:6 [INFO] [stderr] | [INFO] [stderr] 77 | ($op:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:3:7 [INFO] [stderr] | [INFO] [stderr] 3 | #[cfg(madsim)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:3:7 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:5:11 [INFO] [stderr] | [INFO] [stderr] 5 | #[cfg(not(madsim))] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:5:11 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:9:7 [INFO] [stdout] | [INFO] [stdout] 9 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:11:11 [INFO] [stdout] | [INFO] [stdout] 11 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/lib.rs:9:7 [INFO] [stderr] | [INFO] [stderr] 9 | #[cfg(madsim)] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/std/admin.rs:870:83 [INFO] [stdout] | [INFO] [stdout] 858 | impl<'a> NewPartitions<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stdout] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:11:11 [INFO] [stderr] | [INFO] [stderr] 11 | #[cfg(not(madsim))] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/std/admin.rs:870:83 [INFO] [stderr] | [INFO] [stderr] 858 | impl<'a> NewPartitions<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stderr] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/std/client.rs:607:16 [INFO] [stderr] | [INFO] [stderr] 604 | ) -> i32 { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 607 | return unsafe { libc::getaddrinfo(node, service, hints, res) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/std/client.rs:635:5 [INFO] [stderr] | [INFO] [stderr] 604 | ) -> i32 { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 635 | unsafe { libc::getaddrinfo(node.as_ptr(), service.as_ptr(), hints, res) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/std/client.rs:266:9 [INFO] [stdout] | [INFO] [stdout] 266 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 267 | | fn rd_kafka_conf_set_resolve_cb( [INFO] [stdout] 268 | | conf: *mut rdsys::rd_kafka_conf_t, [INFO] [stdout] 269 | | resolve_cb: Option< [INFO] [stdout] ... | [INFO] [stdout] 278 | | ); [INFO] [stdout] 279 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: aborting due to 2 previous errors; 7 warnings emitted [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/std/message.rs:813:11 [INFO] [stdout] | [INFO] [stdout] 813 | ($($N:expr)+) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 813 | ($($N:expr_2021)+) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/std/mocking.rs:77:10 [INFO] [stdout] | [INFO] [stdout] 77 | ($op:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 77 | ($op:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stdout] warning: trait method `poll` will become ambiguous in Rust 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:122:32 [INFO] [stdout] | [INFO] [stdout] 122 | if let Some(message) = self.poll() { [INFO] [stdout] | ^^^^ help: disambiguate the method call: `(&*self)` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: `--force-warn rust-2024-prelude-collisions` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Original diagnostics will follow. [INFO] [stdout] warning: trait method `poll` will become ambiguous in Rust 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:136:15 [INFO] [stdout] | [INFO] [stdout] 136 | match self.poll() { [INFO] [stdout] | ^^^^ help: disambiguate the method call: `(&*self)` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:192:18 [INFO] [stdout] | [INFO] [stdout] 192 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafka) -> NativeClient { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:560:15 [INFO] [stdout] | [INFO] [stdout] 560 | let fac = CStr::from_ptr(fac).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:554:1 [INFO] [stdout] | [INFO] [stdout] 554 | / pub(crate) unsafe extern "C" fn native_log_cb( [INFO] [stdout] 555 | | client: *const RDKafka, [INFO] [stdout] 556 | | level: i32, [INFO] [stdout] 557 | | fac: *const c_char, [INFO] [stdout] 558 | | buf: *const c_char, [INFO] [stdout] 559 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:561:23 [INFO] [stdout] | [INFO] [stdout] 561 | let log_message = CStr::from_ptr(buf).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:24 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_opaque` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:26 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:577:24 [INFO] [stdout] | [INFO] [stdout] 577 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub(crate) unsafe extern "C" fn native_stats_cb( [INFO] [stdout] 572 | | _conf: *mut RDKafka, [INFO] [stdout] 573 | | json: *mut c_char, [INFO] [stdout] 574 | | json_len: usize, [INFO] [stdout] 575 | | opaque: *mut c_void, [INFO] [stdout] 576 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:578:23 [INFO] [stdout] | [INFO] [stdout] 578 | context.stats_raw(slice::from_raw_parts(json as *mut u8, json_len)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:590:18 [INFO] [stdout] | [INFO] [stdout] 590 | let reason = CStr::from_ptr(reason).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:582:1 [INFO] [stdout] | [INFO] [stdout] 582 | / pub(crate) unsafe extern "C" fn native_error_cb( [INFO] [stdout] 583 | | _client: *mut RDKafka, [INFO] [stdout] 584 | | err: i32, [INFO] [stdout] 585 | | reason: *const c_char, [INFO] [stdout] 586 | | opaque: *mut c_void, [INFO] [stdout] 587 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:592:24 [INFO] [stdout] | [INFO] [stdout] 592 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:611:22 [INFO] [stdout] | [INFO] [stdout] 611 | let host = match CStr::from_ptr(node).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:598:1 [INFO] [stdout] | [INFO] [stdout] 598 | / pub(crate) unsafe extern "C" fn native_resolve_cb( [INFO] [stdout] 599 | | node: *const c_char, [INFO] [stdout] 600 | | service: *const c_char, [INFO] [stdout] 601 | | hints: *const addrinfo, [INFO] [stdout] 602 | | res: *mut *mut addrinfo, [INFO] [stdout] 603 | | opaque: *mut c_void, [INFO] [stdout] 604 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:615:22 [INFO] [stdout] | [INFO] [stdout] 615 | let port = match CStr::from_ptr(service).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:621:24 [INFO] [stdout] | [INFO] [stdout] 621 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:670:28 [INFO] [stdout] | [INFO] [stdout] 670 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::cstr_to_owned` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:673:27 [INFO] [stdout] | [INFO] [stdout] 673 | false => Some(util::cstr_to_owned(oauthbearer_config)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:683:24 [INFO] [stdout] | [INFO] [stdout] 683 | let code = rdkafka_sys::rd_kafka_oauthbearer_set_token( [INFO] [stdout] | ________________________^ [INFO] [stdout] 684 | | client, [INFO] [stdout] 685 | | token.as_ptr(), [INFO] [stdout] 686 | | lifetime_ms, [INFO] [stdout] ... | [INFO] [stdout] 691 | | err_buf.capacity(), [INFO] [stdout] 692 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:700:17 [INFO] [stdout] | [INFO] [stdout] 700 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, err_buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:713:13 [INFO] [stdout] | [INFO] [stdout] 713 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, message.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/config.rs:97:18 [INFO] [stdout] | [INFO] [stdout] 97 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/config.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaConf) -> NativeClientConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:29:1 [INFO] [stdout] | [INFO] [stdout] 29 | / pub(crate) unsafe extern "C" fn native_commit_cb( [INFO] [stdout] 30 | | _conf: *mut RDKafka, [INFO] [stdout] 31 | | err: RDKafkaRespErr, [INFO] [stdout] 32 | | offsets: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 33 | | opaque_ptr: *mut c_void, [INFO] [stdout] 34 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:45:37 [INFO] [stdout] | [INFO] [stdout] 45 | let tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(offsets)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:58:24 [INFO] [stdout] | [INFO] [stdout] 58 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / unsafe extern "C" fn native_rebalance_cb( [INFO] [stdout] 53 | | rk: *mut RDKafka, [INFO] [stdout] 54 | | err: RDKafkaRespErr, [INFO] [stdout] 55 | | native_tpl: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 56 | | opaque_ptr: *mut c_void, [INFO] [stdout] 57 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::client::NativeClient::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:59:43 [INFO] [stdout] | [INFO] [stdout] 59 | let native_client = ManuallyDrop::new(NativeClient::from_ptr(rk)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:60:37 [INFO] [stdout] | [INFO] [stdout] 60 | let mut tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(native_tpl)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:13 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:746:9 [INFO] [stdout] | [INFO] [stdout] 746 | / unsafe extern "C" fn native_message_queue_nonempty_cb( [INFO] [stdout] 747 | | _: *mut RDKafka, [INFO] [stdout] 748 | | opaque_ptr: *mut c_void, [INFO] [stdout] 749 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:15 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:37:19 [INFO] [stdout] | [INFO] [stdout] 37 | let wakers = &*(opaque_ptr as *const WakerSlab); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | unsafe extern "C" fn native_message_queue_nonempty_cb(_: *mut RDKafka, opaque_ptr: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | / rdsys::rd_kafka_queue_cb_event_enable( [INFO] [stdout] 43 | | queue.ptr(), [INFO] [stdout] 44 | | Some(native_message_queue_nonempty_cb), [INFO] [stdout] 45 | | Arc::as_ptr(wakers) as *mut c_void, [INFO] [stdout] 46 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | unsafe fn enable_nonempty_callback(queue: &NativeQueue, wakers: &Arc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | rdsys::rd_kafka_queue_cb_event_enable(queue.ptr(), None, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | unsafe fn disable_nonempty_callback(queue: &NativeQueue) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/error.rs:60:22 [INFO] [stdout] | [INFO] [stdout] 60 | RDKafkaError(NativePtr::from_ptr(ptr).map(Arc::new)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/error.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn from_ptr(ptr: *mut rdsys::rd_kafka_error_t) -> RDKafkaError { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_group_list_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:143:5 [INFO] [stdout] | [INFO] [stdout] 143 | rdsys::rd_kafka_group_list_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe extern "C" fn drop_group_list(ptr: *mut RDKafkaGroupList) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:149:19 [INFO] [stdout] | [INFO] [stdout] 149 | GroupList(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaGroupList) -> GroupList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:239:10 [INFO] [stdout] | [INFO] [stdout] 239 | &*(headers_ptr as *mut BorrowedHeaders) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / unsafe fn from_native_ptr( [INFO] [stdout] 236 | | _owner: &T, [INFO] [stdout] 237 | | headers_ptr: *mut rdsys::rd_kafka_headers_t, [INFO] [stdout] 238 | | ) -> &BorrowedHeaders { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:360:18 [INFO] [stdout] | [INFO] [stdout] 360 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:355:5 [INFO] [stdout] | [INFO] [stdout] 355 | / pub(crate) unsafe fn from_dr_callback( [INFO] [stdout] 356 | | ptr: *mut RDKafkaMessage, [INFO] [stdout] 357 | | _owner: &'a O, [INFO] [stdout] 358 | | ) -> DeliveryResult<'a> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:363:12 [INFO] [stdout] | [INFO] [stdout] 363 | if (*ptr).err.is_error() { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:365:47 [INFO] [stdout] | [INFO] [stdout] 365 | KafkaError::MessageProduction((*ptr).err.into()), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::ptr_to_opt_mut_slice` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | util::ptr_to_opt_mut_slice((*self.ptr).payload, (*self.ptr).len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:421:5 [INFO] [stdout] | [INFO] [stdout] 421 | unsafe fn payload_mut(&mut self) -> Option<&mut [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_metadata_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | rdsys::rd_kafka_metadata_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | unsafe extern "C" fn drop_metadata(ptr: *mut RDKafkaMetadata) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:124:18 [INFO] [stdout] | [INFO] [stdout] 124 | Metadata(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaMetadata) -> Metadata { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:83:33 [INFO] [stdout] | [INFO] [stdout] 83 | let producer_context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | / unsafe extern "C" fn delivery_cb>( [INFO] [stdout] 79 | | _client: *mut RDKafka, [INFO] [stdout] 80 | | msg: *const RDKafkaMessage, [INFO] [stdout] 81 | | opaque: *mut c_void, [INFO] [stdout] 82 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::IntoOpaque::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:27 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:55 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::message::BorrowedMessage::<'a>::from_dr_callback` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:88:27 [INFO] [stdout] | [INFO] [stdout] 88 | let delivery_result = BorrowedMessage::from_dr_callback(msg as *mut RDKafkaMessage, &owner); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:22 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | / unsafe extern "C" fn partitioner_cb>( [INFO] [stdout] 229 | | topic: *const RDKafkaTopic, [INFO] [stdout] 230 | | keydata: *const c_void, [INFO] [stdout] 231 | | keylen: usize, [INFO] [stdout] ... | [INFO] [stdout] 234 | | _msg_opaque: *mut c_void, [INFO] [stdout] 235 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_name` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:37 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::str::from_utf8_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:237:22 [INFO] [stdout] | [INFO] [stdout] 237 | let topic_name = str::from_utf8_unchecked(topic_name.to_bytes()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_partition_available` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:239:43 [INFO] [stdout] | [INFO] [stdout] 239 | let is_partition_available = |p: i32| rdsys::rd_kafka_topic_partition_available(topic, p) == 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:244:14 [INFO] [stdout] | [INFO] [stdout] 244 | Some(slice::from_raw_parts(keydata as *const u8, keylen)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:247:33 [INFO] [stdout] | [INFO] [stdout] 247 | let producer_context = &mut *(rkt_opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/topic_partition_list.rs:204:18 [INFO] [stdout] | [INFO] [stdout] 204 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/topic_partition_list.rs:202:5 [INFO] [stdout] | [INFO] [stdout] 202 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaTopicPartitionList) -> TopicPartitionList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | Some(slice::from_raw_parts::(ptr as *const T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:92:1 [INFO] [stdout] | [INFO] [stdout] 92 | pub(crate) unsafe fn ptr_to_opt_slice<'a, T>(ptr: *const c_void, size: usize) -> Option<&'a [T]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | Some(slice::from_raw_parts_mut::(ptr as *mut T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:100:1 [INFO] [stdout] | [INFO] [stdout] 100 | / pub(crate) unsafe fn ptr_to_opt_mut_slice<'a, T>( [INFO] [stdout] 101 | | ptr: *const c_void, [INFO] [stdout] 102 | | size: usize, [INFO] [stdout] 103 | | ) -> Option<&'a mut [T]> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | slice::from_raw_parts::(ptr as *const T, size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:113:1 [INFO] [stdout] | [INFO] [stdout] 113 | pub(crate) unsafe fn ptr_to_slice<'a, T>(ptr: *const c_void, size: usize) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:164:9 [INFO] [stdout] | [INFO] [stdout] 164 | Box::from_raw(ptr as *mut T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:163:5 [INFO] [stdout] | [INFO] [stdout] 163 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:174:9 [INFO] [stdout] | [INFO] [stdout] 174 | Arc::from_raw(ptr as *const T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | CStr::from_ptr(cstr as *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:183:1 [INFO] [stdout] | [INFO] [stdout] 183 | pub unsafe fn cstr_to_owned(cstr: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:55:10 [INFO] [stdout] | [INFO] [stdout] 55 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:51:26 [INFO] [stdout] | [INFO] [stdout] 51 | pub fn create_topics<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 52 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 53 | topics: I, [INFO] [stdout] 54 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 55 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:100:10 [INFO] [stdout] | [INFO] [stdout] 100 | ) -> impl Future>> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:97:9 [INFO] [stdout] | [INFO] [stdout] 97 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 98 | topic_names: &[&str], [INFO] [stdout] | ^ ^ [INFO] [stdout] 99 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 100 | ) -> impl Future>> + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:139:10 [INFO] [stdout] | [INFO] [stdout] 139 | ) -> impl Future>> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 137 | group_names: &[&str], [INFO] [stdout] | ^ ^ [INFO] [stdout] 138 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 139 | ) -> impl Future>> + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:185:10 [INFO] [stdout] | [INFO] [stdout] 185 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:181:30 [INFO] [stdout] | [INFO] [stdout] 181 | pub fn create_partitions<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 182 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 183 | partitions: I, [INFO] [stdout] 184 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 185 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:230:10 [INFO] [stdout] | [INFO] [stdout] 230 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:226:29 [INFO] [stdout] | [INFO] [stdout] 226 | pub fn describe_configs<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 227 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 228 | configs: I, [INFO] [stdout] 229 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 230 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:295:10 [INFO] [stdout] | [INFO] [stdout] 295 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:291:26 [INFO] [stdout] | [INFO] [stdout] 291 | pub fn alter_configs<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 292 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 293 | configs: I, [INFO] [stdout] 294 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 295 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/consumer/base_consumer.rs:673:16 [INFO] [stdout] | [INFO] [stdout] 673 | if let Some(item) = self.0.poll(None) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/consumer/base_consumer.rs:675:13 [INFO] [stdout] | [INFO] [stdout] 675 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 673 ~ match self.0.poll(None) { Some(item) => { [INFO] [stdout] 674 | return Some(item); [INFO] [stdout] 675 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if let Some(waker) = waker.take() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:69:13 [INFO] [stdout] | [INFO] [stdout] 69 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 67 ~ match waker.take() { Some(waker) => { [INFO] [stdout] 68 | waker.wake(); [INFO] [stdout] 69 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/message.rs:629:12 [INFO] [stdout] | [INFO] [stdout] 629 | if let Some(headers) = headers { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/message.rs:631:9 [INFO] [stdout] | [INFO] [stdout] 631 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 629 ~ match headers { Some(headers) => { [INFO] [stdout] 630 | self.headers.replace(headers); [INFO] [stdout] 631 ~ } _ => { [INFO] [stdout] 632 | self.headers = None; [INFO] [stdout] 633 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/mocking.rs:390:12 [INFO] [stdout] | [INFO] [stdout] 390 | if let MockClusterClient::Owned(..) = self.client { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/mocking.rs:394:9 [INFO] [stdout] | [INFO] [stdout] 394 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 390 ~ match self.client { MockClusterClient::Owned(..) => { [INFO] [stdout] 391 | unsafe { [INFO] [stdout] 392 | rdsys::rd_kafka_mock_cluster_destroy(self.mock_cluster); [INFO] [stdout] 393 | } [INFO] [stdout] 394 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 75 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `madsim_rdkafka` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/std/admin.rs [INFO] [stderr] * src/std/client.rs [INFO] [stderr] * src/std/message.rs [INFO] [stderr] * src/std/mocking.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/std/message.rs:813:8 [INFO] [stderr] | [INFO] [stderr] 813 | ($($N:expr_2021)+) => { [INFO] [stderr] | ^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/std/mocking.rs:77:6 [INFO] [stderr] | [INFO] [stderr] 77 | ($op:expr_2021) => { [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:3:7 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:3:7 [INFO] [stderr] | [INFO] [stderr] 3 | #[cfg(madsim)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:5:11 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:9:7 [INFO] [stdout] | [INFO] [stdout] 9 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:5:11 [INFO] [stderr] | [INFO] [stderr] 5 | #[cfg(not(madsim))] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:9:7 [INFO] [stderr] | [INFO] [stderr] 9 | #[cfg(madsim)] [INFO] [stderr] | ^^^^^^ [INFO] [stderr] | [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: unexpected `cfg` condition name: `madsim` [INFO] [stderr] --> src/lib.rs:11:11 [INFO] [stderr] | [INFO] [stderr] 11 | #[cfg(not(madsim))] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:11:11 [INFO] [stdout] | [INFO] [stdout] 11 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ^^^^^^ [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/std/admin.rs:870:83 [INFO] [stdout] | [INFO] [stdout] 858 | impl<'a> NewPartitions<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stdout] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/std/client.rs:266:9 [INFO] [stdout] | [INFO] [stdout] 266 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 267 | | fn rd_kafka_conf_set_resolve_cb( [INFO] [stdout] 268 | | conf: *mut rdsys::rd_kafka_conf_t, [INFO] [stdout] 269 | | resolve_cb: Option< [INFO] [stdout] ... | [INFO] [stdout] 278 | | ); [INFO] [stdout] 279 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: consider using a Cargo feature instead [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/std/message.rs:813:11 [INFO] [stdout] | [INFO] [stdout] 813 | ($($N:expr)+) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 813 | ($($N:expr_2021)+) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stderr] [lints.rust] [INFO] [stderr] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stderr] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stderr] = note: see for more information about checking conditional configuration [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/std/mocking.rs:77:10 [INFO] [stdout] | [INFO] [stdout] 77 | ($op:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 77 | ($op:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/std/admin.rs:870:83 [INFO] [stdout] warning: trait method `poll` will become ambiguous in Rust 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:122:32 [INFO] [stdout] | [INFO] [stdout] 122 | if let Some(message) = self.poll() { [INFO] [stdout] | ^^^^ help: disambiguate the method call: `(&*self)` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: `--force-warn rust-2024-prelude-collisions` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: trait method `poll` will become ambiguous in Rust 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:136:15 [INFO] [stdout] | [INFO] [stdout] 136 | match self.poll() { [INFO] [stdout] | ^^^^ help: disambiguate the method call: `(&*self)` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 858 | impl<'a> NewPartitions<'a> { [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stderr] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/std/client.rs:607:16 [INFO] [stderr] | [INFO] [stderr] 604 | ) -> i32 { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 607 | return unsafe { libc::getaddrinfo(node, service, hints, res) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/std/client.rs:635:5 [INFO] [stderr] | [INFO] [stderr] 604 | ) -> i32 { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 635 | unsafe { libc::getaddrinfo(node.as_ptr(), service.as_ptr(), hints, res) } [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 2 previous errors; 7 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:192:18 [INFO] [stdout] | [INFO] [stdout] 192 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafka) -> NativeClient { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:560:15 [INFO] [stdout] | [INFO] [stdout] 560 | let fac = CStr::from_ptr(fac).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:554:1 [INFO] [stdout] | [INFO] [stdout] 554 | / pub(crate) unsafe extern "C" fn native_log_cb( [INFO] [stdout] 555 | | client: *const RDKafka, [INFO] [stdout] 556 | | level: i32, [INFO] [stdout] 557 | | fac: *const c_char, [INFO] [stdout] 558 | | buf: *const c_char, [INFO] [stdout] 559 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:561:23 [INFO] [stdout] | [INFO] [stdout] 561 | let log_message = CStr::from_ptr(buf).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:24 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_opaque` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:26 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:577:24 [INFO] [stdout] | [INFO] [stdout] 577 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub(crate) unsafe extern "C" fn native_stats_cb( [INFO] [stdout] 572 | | _conf: *mut RDKafka, [INFO] [stdout] 573 | | json: *mut c_char, [INFO] [stdout] 574 | | json_len: usize, [INFO] [stdout] 575 | | opaque: *mut c_void, [INFO] [stdout] 576 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:578:23 [INFO] [stdout] | [INFO] [stdout] 578 | context.stats_raw(slice::from_raw_parts(json as *mut u8, json_len)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:590:18 [INFO] [stdout] | [INFO] [stdout] 590 | let reason = CStr::from_ptr(reason).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:582:1 [INFO] [stdout] | [INFO] [stdout] 582 | / pub(crate) unsafe extern "C" fn native_error_cb( [INFO] [stdout] 583 | | _client: *mut RDKafka, [INFO] [stdout] 584 | | err: i32, [INFO] [stdout] 585 | | reason: *const c_char, [INFO] [stdout] 586 | | opaque: *mut c_void, [INFO] [stdout] 587 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:592:24 [INFO] [stdout] | [INFO] [stdout] 592 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:611:22 [INFO] [stdout] | [INFO] [stdout] 611 | let host = match CStr::from_ptr(node).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:598:1 [INFO] [stdout] | [INFO] [stdout] 598 | / pub(crate) unsafe extern "C" fn native_resolve_cb( [INFO] [stdout] 599 | | node: *const c_char, [INFO] [stdout] 600 | | service: *const c_char, [INFO] [stdout] 601 | | hints: *const addrinfo, [INFO] [stdout] 602 | | res: *mut *mut addrinfo, [INFO] [stdout] 603 | | opaque: *mut c_void, [INFO] [stdout] 604 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:615:22 [INFO] [stdout] | [INFO] [stdout] 615 | let port = match CStr::from_ptr(service).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:621:24 [INFO] [stdout] | [INFO] [stdout] 621 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:670:28 [INFO] [stdout] | [INFO] [stdout] 670 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::cstr_to_owned` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:673:27 [INFO] [stdout] | [INFO] [stdout] 673 | false => Some(util::cstr_to_owned(oauthbearer_config)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:683:24 [INFO] [stdout] | [INFO] [stdout] 683 | let code = rdkafka_sys::rd_kafka_oauthbearer_set_token( [INFO] [stdout] | ________________________^ [INFO] [stdout] 684 | | client, [INFO] [stdout] 685 | | token.as_ptr(), [INFO] [stdout] 686 | | lifetime_ms, [INFO] [stdout] ... | [INFO] [stdout] 691 | | err_buf.capacity(), [INFO] [stdout] 692 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:700:17 [INFO] [stdout] | [INFO] [stdout] 700 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, err_buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:713:13 [INFO] [stdout] | [INFO] [stdout] 713 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, message.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/config.rs:97:18 [INFO] [stdout] | [INFO] [stdout] 97 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/config.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaConf) -> NativeClientConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:29:1 [INFO] [stdout] | [INFO] [stdout] 29 | / pub(crate) unsafe extern "C" fn native_commit_cb( [INFO] [stdout] 30 | | _conf: *mut RDKafka, [INFO] [stdout] 31 | | err: RDKafkaRespErr, [INFO] [stdout] 32 | | offsets: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 33 | | opaque_ptr: *mut c_void, [INFO] [stdout] 34 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:45:37 [INFO] [stdout] | [INFO] [stdout] 45 | let tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(offsets)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:58:24 [INFO] [stdout] | [INFO] [stdout] 58 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / unsafe extern "C" fn native_rebalance_cb( [INFO] [stdout] 53 | | rk: *mut RDKafka, [INFO] [stdout] 54 | | err: RDKafkaRespErr, [INFO] [stdout] 55 | | native_tpl: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 56 | | opaque_ptr: *mut c_void, [INFO] [stdout] 57 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::client::NativeClient::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:59:43 [INFO] [stdout] | [INFO] [stdout] 59 | let native_client = ManuallyDrop::new(NativeClient::from_ptr(rk)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:60:37 [INFO] [stdout] | [INFO] [stdout] 60 | let mut tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(native_tpl)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:13 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:746:9 [INFO] [stdout] | [INFO] [stdout] 746 | / unsafe extern "C" fn native_message_queue_nonempty_cb( [INFO] [stdout] 747 | | _: *mut RDKafka, [INFO] [stdout] 748 | | opaque_ptr: *mut c_void, [INFO] [stdout] 749 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:15 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:37:19 [INFO] [stdout] | [INFO] [stdout] 37 | let wakers = &*(opaque_ptr as *const WakerSlab); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | unsafe extern "C" fn native_message_queue_nonempty_cb(_: *mut RDKafka, opaque_ptr: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | / rdsys::rd_kafka_queue_cb_event_enable( [INFO] [stdout] 43 | | queue.ptr(), [INFO] [stdout] 44 | | Some(native_message_queue_nonempty_cb), [INFO] [stdout] 45 | | Arc::as_ptr(wakers) as *mut c_void, [INFO] [stdout] 46 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | unsafe fn enable_nonempty_callback(queue: &NativeQueue, wakers: &Arc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | rdsys::rd_kafka_queue_cb_event_enable(queue.ptr(), None, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | unsafe fn disable_nonempty_callback(queue: &NativeQueue) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/error.rs:60:22 [INFO] [stdout] | [INFO] [stdout] 60 | RDKafkaError(NativePtr::from_ptr(ptr).map(Arc::new)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/error.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn from_ptr(ptr: *mut rdsys::rd_kafka_error_t) -> RDKafkaError { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_group_list_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:143:5 [INFO] [stdout] | [INFO] [stdout] 143 | rdsys::rd_kafka_group_list_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe extern "C" fn drop_group_list(ptr: *mut RDKafkaGroupList) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:149:19 [INFO] [stdout] | [INFO] [stdout] 149 | GroupList(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaGroupList) -> GroupList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:239:10 [INFO] [stdout] | [INFO] [stdout] 239 | &*(headers_ptr as *mut BorrowedHeaders) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / unsafe fn from_native_ptr( [INFO] [stdout] 236 | | _owner: &T, [INFO] [stdout] 237 | | headers_ptr: *mut rdsys::rd_kafka_headers_t, [INFO] [stdout] 238 | | ) -> &BorrowedHeaders { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:360:18 [INFO] [stdout] | [INFO] [stdout] 360 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:355:5 [INFO] [stdout] | [INFO] [stdout] 355 | / pub(crate) unsafe fn from_dr_callback( [INFO] [stdout] 356 | | ptr: *mut RDKafkaMessage, [INFO] [stdout] 357 | | _owner: &'a O, [INFO] [stdout] 358 | | ) -> DeliveryResult<'a> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:363:12 [INFO] [stdout] | [INFO] [stdout] 363 | if (*ptr).err.is_error() { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:365:47 [INFO] [stdout] | [INFO] [stdout] 365 | KafkaError::MessageProduction((*ptr).err.into()), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::ptr_to_opt_mut_slice` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | util::ptr_to_opt_mut_slice((*self.ptr).payload, (*self.ptr).len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:421:5 [INFO] [stdout] | [INFO] [stdout] 421 | unsafe fn payload_mut(&mut self) -> Option<&mut [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_metadata_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | rdsys::rd_kafka_metadata_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | unsafe extern "C" fn drop_metadata(ptr: *mut RDKafkaMetadata) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:124:18 [INFO] [stdout] | [INFO] [stdout] 124 | Metadata(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaMetadata) -> Metadata { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:83:33 [INFO] [stdout] | [INFO] [stdout] 83 | let producer_context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | / unsafe extern "C" fn delivery_cb>( [INFO] [stdout] 79 | | _client: *mut RDKafka, [INFO] [stdout] 80 | | msg: *const RDKafkaMessage, [INFO] [stdout] 81 | | opaque: *mut c_void, [INFO] [stdout] 82 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::IntoOpaque::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:27 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:55 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::message::BorrowedMessage::<'a>::from_dr_callback` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:88:27 [INFO] [stdout] | [INFO] [stdout] 88 | let delivery_result = BorrowedMessage::from_dr_callback(msg as *mut RDKafkaMessage, &owner); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:22 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | / unsafe extern "C" fn partitioner_cb>( [INFO] [stdout] 229 | | topic: *const RDKafkaTopic, [INFO] [stdout] 230 | | keydata: *const c_void, [INFO] [stdout] 231 | | keylen: usize, [INFO] [stdout] ... | [INFO] [stdout] 234 | | _msg_opaque: *mut c_void, [INFO] [stdout] 235 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_name` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:37 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::str::from_utf8_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:237:22 [INFO] [stdout] | [INFO] [stdout] 237 | let topic_name = str::from_utf8_unchecked(topic_name.to_bytes()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_partition_available` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:239:43 [INFO] [stdout] | [INFO] [stdout] 239 | let is_partition_available = |p: i32| rdsys::rd_kafka_topic_partition_available(topic, p) == 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:244:14 [INFO] [stdout] | [INFO] [stdout] 244 | Some(slice::from_raw_parts(keydata as *const u8, keylen)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:247:33 [INFO] [stdout] | [INFO] [stdout] 247 | let producer_context = &mut *(rkt_opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/topic_partition_list.rs:204:18 [INFO] [stdout] | [INFO] [stdout] 204 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/topic_partition_list.rs:202:5 [INFO] [stdout] | [INFO] [stdout] 202 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaTopicPartitionList) -> TopicPartitionList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | Some(slice::from_raw_parts::(ptr as *const T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:92:1 [INFO] [stdout] | [INFO] [stdout] 92 | pub(crate) unsafe fn ptr_to_opt_slice<'a, T>(ptr: *const c_void, size: usize) -> Option<&'a [T]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | Some(slice::from_raw_parts_mut::(ptr as *mut T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:100:1 [INFO] [stdout] | [INFO] [stdout] 100 | / pub(crate) unsafe fn ptr_to_opt_mut_slice<'a, T>( [INFO] [stdout] 101 | | ptr: *const c_void, [INFO] [stdout] 102 | | size: usize, [INFO] [stdout] 103 | | ) -> Option<&'a mut [T]> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | slice::from_raw_parts::(ptr as *const T, size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:113:1 [INFO] [stdout] | [INFO] [stdout] 113 | pub(crate) unsafe fn ptr_to_slice<'a, T>(ptr: *const c_void, size: usize) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:164:9 [INFO] [stdout] | [INFO] [stdout] 164 | Box::from_raw(ptr as *mut T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:163:5 [INFO] [stdout] | [INFO] [stdout] 163 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:174:9 [INFO] [stdout] | [INFO] [stdout] 174 | Arc::from_raw(ptr as *const T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | CStr::from_ptr(cstr as *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:183:1 [INFO] [stdout] | [INFO] [stdout] 183 | pub unsafe fn cstr_to_owned(cstr: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:55:10 [INFO] [stdout] | [INFO] [stdout] 55 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:51:26 [INFO] [stdout] | [INFO] [stdout] 51 | pub fn create_topics<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 52 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 53 | topics: I, [INFO] [stdout] 54 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 55 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:100:10 [INFO] [stdout] | [INFO] [stdout] 100 | ) -> impl Future>> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:97:9 [INFO] [stdout] | [INFO] [stdout] 97 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 98 | topic_names: &[&str], [INFO] [stdout] | ^ ^ [INFO] [stdout] 99 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 100 | ) -> impl Future>> + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:139:10 [INFO] [stdout] | [INFO] [stdout] 139 | ) -> impl Future>> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:136:9 [INFO] [stdout] | [INFO] [stdout] 136 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 137 | group_names: &[&str], [INFO] [stdout] | ^ ^ [INFO] [stdout] 138 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 139 | ) -> impl Future>> + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:185:10 [INFO] [stdout] | [INFO] [stdout] 185 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:181:30 [INFO] [stdout] | [INFO] [stdout] 181 | pub fn create_partitions<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 182 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 183 | partitions: I, [INFO] [stdout] 184 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 185 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:230:10 [INFO] [stdout] | [INFO] [stdout] 230 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:226:29 [INFO] [stdout] | [INFO] [stdout] 226 | pub fn describe_configs<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 227 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 228 | configs: I, [INFO] [stdout] 229 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 230 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl futures_util::Future>, KafkaError>>` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/std/admin.rs:295:10 [INFO] [stdout] | [INFO] [stdout] 295 | ) -> impl Future>> [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, these lifetimes are in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/std/admin.rs:291:26 [INFO] [stdout] | [INFO] [stdout] 291 | pub fn alter_configs<'a, I>( [INFO] [stdout] | ^^ [INFO] [stdout] 292 | &self, [INFO] [stdout] | ^ [INFO] [stdout] 293 | configs: I, [INFO] [stdout] 294 | opts: &AdminOptions, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 295 | ) -> impl Future>> + use [INFO] [stdout] | +++++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/consumer/base_consumer.rs:673:16 [INFO] [stdout] | [INFO] [stdout] 673 | if let Some(item) = self.0.poll(None) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/consumer/base_consumer.rs:675:13 [INFO] [stdout] | [INFO] [stdout] 675 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 673 ~ match self.0.poll(None) { Some(item) => { [INFO] [stdout] 674 | return Some(item); [INFO] [stdout] 675 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if let Some(waker) = waker.take() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^------------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:69:13 [INFO] [stdout] | [INFO] [stdout] 69 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 67 ~ match waker.take() { Some(waker) => { [INFO] [stdout] 68 | waker.wake(); [INFO] [stdout] 69 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/message.rs:629:12 [INFO] [stdout] | [INFO] [stdout] 629 | if let Some(headers) = headers { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/message.rs:631:9 [INFO] [stdout] | [INFO] [stdout] 631 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 629 ~ match headers { Some(headers) => { [INFO] [stdout] 630 | self.headers.replace(headers); [INFO] [stdout] 631 ~ } _ => { [INFO] [stdout] 632 | self.headers = None; [INFO] [stdout] 633 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/std/mocking.rs:390:12 [INFO] [stdout] | [INFO] [stdout] 390 | if let MockClusterClient::Owned(..) = self.client { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/std/mocking.rs:394:9 [INFO] [stdout] | [INFO] [stdout] 394 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 390 ~ match self.client { MockClusterClient::Owned(..) => { [INFO] [stdout] 391 | unsafe { [INFO] [stdout] 392 | rdsys::rd_kafka_mock_cluster_destroy(self.mock_cluster); [INFO] [stdout] 393 | } [INFO] [stdout] 394 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 75 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating tests/test.rs from 2021 edition to 2024 [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> tests/test.rs:1:8 [INFO] [stdout] | [INFO] [stdout] 1 | #![cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 20.01s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking madsim-rdkafka v0.4.2+0.34.0 (/tmp/fixit) [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/std/client.rs:266:9 [INFO] [stdout] | [INFO] [stdout] 266 | / extern "C" { [INFO] [stdout] 267 | | fn rd_kafka_conf_set_resolve_cb( [INFO] [stdout] 268 | | conf: *mut rdsys::rd_kafka_conf_t, [INFO] [stdout] 269 | | resolve_cb: Option< [INFO] [stdout] ... | [INFO] [stdout] 278 | | ); [INFO] [stdout] 279 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/std/client.rs:266:9 [INFO] [stdout] | [INFO] [stdout] 266 | / extern "C" { [INFO] [stdout] 267 | | fn rd_kafka_conf_set_resolve_cb( [INFO] [stdout] 268 | | conf: *mut rdsys::rd_kafka_conf_t, [INFO] [stdout] 269 | | resolve_cb: Option< [INFO] [stdout] ... | [INFO] [stdout] 278 | | ); [INFO] [stdout] 279 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:3:7 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:5:11 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:9:7 [INFO] [stdout] | [INFO] [stdout] 9 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:11:11 [INFO] [stdout] | [INFO] [stdout] 11 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/std/admin.rs:870:83 [INFO] [stdout] | [INFO] [stdout] 858 | impl<'a> NewPartitions<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stdout] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:3:7 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `fmt_debug`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:5:11 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:9:7 [INFO] [stdout] | [INFO] [stdout] 9 | #[cfg(madsim)] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `madsim` [INFO] [stdout] --> src/lib.rs:11:11 [INFO] [stdout] | [INFO] [stdout] 11 | #[cfg(not(madsim))] [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(madsim)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(madsim)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/std/admin.rs:870:83 [INFO] [stdout] | [INFO] [stdout] 858 | impl<'a> NewPartitions<'a> { [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 870 | pub fn assign(mut self, assignment: PartitionAssignment<'a>) -> NewPartitions<'_> { [INFO] [stdout] | ^^ this elided lifetime gets resolved as `'a` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:192:18 [INFO] [stdout] | [INFO] [stdout] 192 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafka) -> NativeClient { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:560:15 [INFO] [stdout] | [INFO] [stdout] 560 | let fac = CStr::from_ptr(fac).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:554:1 [INFO] [stdout] | [INFO] [stdout] 554 | / pub(crate) unsafe extern "C" fn native_log_cb( [INFO] [stdout] 555 | | client: *const RDKafka, [INFO] [stdout] 556 | | level: i32, [INFO] [stdout] 557 | | fac: *const c_char, [INFO] [stdout] 558 | | buf: *const c_char, [INFO] [stdout] 559 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:561:23 [INFO] [stdout] | [INFO] [stdout] 561 | let log_message = CStr::from_ptr(buf).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:24 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_opaque` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:26 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:577:24 [INFO] [stdout] | [INFO] [stdout] 577 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub(crate) unsafe extern "C" fn native_stats_cb( [INFO] [stdout] 572 | | _conf: *mut RDKafka, [INFO] [stdout] 573 | | json: *mut c_char, [INFO] [stdout] 574 | | json_len: usize, [INFO] [stdout] 575 | | opaque: *mut c_void, [INFO] [stdout] 576 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:578:23 [INFO] [stdout] | [INFO] [stdout] 578 | context.stats_raw(slice::from_raw_parts(json as *mut u8, json_len)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:590:18 [INFO] [stdout] | [INFO] [stdout] 590 | let reason = CStr::from_ptr(reason).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:582:1 [INFO] [stdout] | [INFO] [stdout] 582 | / pub(crate) unsafe extern "C" fn native_error_cb( [INFO] [stdout] 583 | | _client: *mut RDKafka, [INFO] [stdout] 584 | | err: i32, [INFO] [stdout] 585 | | reason: *const c_char, [INFO] [stdout] 586 | | opaque: *mut c_void, [INFO] [stdout] 587 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:592:24 [INFO] [stdout] | [INFO] [stdout] 592 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:611:22 [INFO] [stdout] | [INFO] [stdout] 611 | let host = match CStr::from_ptr(node).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:598:1 [INFO] [stdout] | [INFO] [stdout] 598 | / pub(crate) unsafe extern "C" fn native_resolve_cb( [INFO] [stdout] 599 | | node: *const c_char, [INFO] [stdout] 600 | | service: *const c_char, [INFO] [stdout] 601 | | hints: *const addrinfo, [INFO] [stdout] 602 | | res: *mut *mut addrinfo, [INFO] [stdout] 603 | | opaque: *mut c_void, [INFO] [stdout] 604 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:615:22 [INFO] [stdout] | [INFO] [stdout] 615 | let port = match CStr::from_ptr(service).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:621:24 [INFO] [stdout] | [INFO] [stdout] 621 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:670:28 [INFO] [stdout] | [INFO] [stdout] 670 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::cstr_to_owned` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:673:27 [INFO] [stdout] | [INFO] [stdout] 673 | false => Some(util::cstr_to_owned(oauthbearer_config)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:683:24 [INFO] [stdout] | [INFO] [stdout] 683 | let code = rdkafka_sys::rd_kafka_oauthbearer_set_token( [INFO] [stdout] | ________________________^ [INFO] [stdout] 684 | | client, [INFO] [stdout] 685 | | token.as_ptr(), [INFO] [stdout] 686 | | lifetime_ms, [INFO] [stdout] ... | [INFO] [stdout] 691 | | err_buf.capacity(), [INFO] [stdout] 692 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:700:17 [INFO] [stdout] | [INFO] [stdout] 700 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, err_buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:713:13 [INFO] [stdout] | [INFO] [stdout] 713 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, message.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/config.rs:97:18 [INFO] [stdout] | [INFO] [stdout] 97 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/config.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaConf) -> NativeClientConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:192:18 [INFO] [stdout] | [INFO] [stdout] 192 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafka) -> NativeClient { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:29:1 [INFO] [stdout] | [INFO] [stdout] 29 | / pub(crate) unsafe extern "C" fn native_commit_cb( [INFO] [stdout] 30 | | _conf: *mut RDKafka, [INFO] [stdout] 31 | | err: RDKafkaRespErr, [INFO] [stdout] 32 | | offsets: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 33 | | opaque_ptr: *mut c_void, [INFO] [stdout] 34 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:45:37 [INFO] [stdout] | [INFO] [stdout] 45 | let tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(offsets)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:58:24 [INFO] [stdout] | [INFO] [stdout] 58 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / unsafe extern "C" fn native_rebalance_cb( [INFO] [stdout] 53 | | rk: *mut RDKafka, [INFO] [stdout] 54 | | err: RDKafkaRespErr, [INFO] [stdout] 55 | | native_tpl: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 56 | | opaque_ptr: *mut c_void, [INFO] [stdout] 57 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::client::NativeClient::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:59:43 [INFO] [stdout] | [INFO] [stdout] 59 | let native_client = ManuallyDrop::new(NativeClient::from_ptr(rk)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:60:37 [INFO] [stdout] | [INFO] [stdout] 60 | let mut tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(native_tpl)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:560:15 [INFO] [stdout] | [INFO] [stdout] 560 | let fac = CStr::from_ptr(fac).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:554:1 [INFO] [stdout] | [INFO] [stdout] 554 | / pub(crate) unsafe extern "C" fn native_log_cb( [INFO] [stdout] 555 | | client: *const RDKafka, [INFO] [stdout] 556 | | level: i32, [INFO] [stdout] 557 | | fac: *const c_char, [INFO] [stdout] 558 | | buf: *const c_char, [INFO] [stdout] 559 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:561:23 [INFO] [stdout] | [INFO] [stdout] 561 | let log_message = CStr::from_ptr(buf).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:24 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_opaque` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:563:26 [INFO] [stdout] | [INFO] [stdout] 563 | let context = &mut *(rdsys::rd_kafka_opaque(client) as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:577:24 [INFO] [stdout] | [INFO] [stdout] 577 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:571:1 [INFO] [stdout] | [INFO] [stdout] 571 | / pub(crate) unsafe extern "C" fn native_stats_cb( [INFO] [stdout] 572 | | _conf: *mut RDKafka, [INFO] [stdout] 573 | | json: *mut c_char, [INFO] [stdout] 574 | | json_len: usize, [INFO] [stdout] 575 | | opaque: *mut c_void, [INFO] [stdout] 576 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:578:23 [INFO] [stdout] | [INFO] [stdout] 578 | context.stats_raw(slice::from_raw_parts(json as *mut u8, json_len)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:590:18 [INFO] [stdout] | [INFO] [stdout] 590 | let reason = CStr::from_ptr(reason).to_string_lossy(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:582:1 [INFO] [stdout] | [INFO] [stdout] 582 | / pub(crate) unsafe extern "C" fn native_error_cb( [INFO] [stdout] 583 | | _client: *mut RDKafka, [INFO] [stdout] 584 | | err: i32, [INFO] [stdout] 585 | | reason: *const c_char, [INFO] [stdout] 586 | | opaque: *mut c_void, [INFO] [stdout] 587 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:592:24 [INFO] [stdout] | [INFO] [stdout] 592 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:611:22 [INFO] [stdout] | [INFO] [stdout] 611 | let host = match CStr::from_ptr(node).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:598:1 [INFO] [stdout] | [INFO] [stdout] 598 | / pub(crate) unsafe extern "C" fn native_resolve_cb( [INFO] [stdout] 599 | | node: *const c_char, [INFO] [stdout] 600 | | service: *const c_char, [INFO] [stdout] 601 | | hints: *const addrinfo, [INFO] [stdout] 602 | | res: *mut *mut addrinfo, [INFO] [stdout] 603 | | opaque: *mut c_void, [INFO] [stdout] 604 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:615:22 [INFO] [stdout] | [INFO] [stdout] 615 | let port = match CStr::from_ptr(service).to_str() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:621:24 [INFO] [stdout] | [INFO] [stdout] 621 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:670:28 [INFO] [stdout] | [INFO] [stdout] 670 | let context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::cstr_to_owned` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:673:27 [INFO] [stdout] | [INFO] [stdout] 673 | false => Some(util::cstr_to_owned(oauthbearer_config)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:683:24 [INFO] [stdout] | [INFO] [stdout] 683 | let code = rdkafka_sys::rd_kafka_oauthbearer_set_token( [INFO] [stdout] | ________________________^ [INFO] [stdout] 684 | | client, [INFO] [stdout] 685 | | token.as_ptr(), [INFO] [stdout] 686 | | lifetime_ms, [INFO] [stdout] ... | [INFO] [stdout] 691 | | err_buf.capacity(), [INFO] [stdout] 692 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/client.rs:664:1 [INFO] [stdout] | [INFO] [stdout] 664 | / pub(crate) unsafe extern "C" fn native_oauth_refresh_cb( [INFO] [stdout] 665 | | client: *mut RDKafka, [INFO] [stdout] 666 | | oauthbearer_config: *const c_char, [INFO] [stdout] 667 | | opaque: *mut c_void, [INFO] [stdout] 668 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:700:17 [INFO] [stdout] | [INFO] [stdout] 700 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, err_buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_oauthbearer_set_token_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/client.rs:713:13 [INFO] [stdout] | [INFO] [stdout] 713 | rdkafka_sys::rd_kafka_oauthbearer_set_token_failure(client, message.as_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/config.rs:97:18 [INFO] [stdout] | [INFO] [stdout] 97 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/config.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaConf) -> NativeClientConfig { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:29:1 [INFO] [stdout] | [INFO] [stdout] 29 | / pub(crate) unsafe extern "C" fn native_commit_cb( [INFO] [stdout] 30 | | _conf: *mut RDKafka, [INFO] [stdout] 31 | | err: RDKafkaRespErr, [INFO] [stdout] 32 | | offsets: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 33 | | opaque_ptr: *mut c_void, [INFO] [stdout] 34 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:45:37 [INFO] [stdout] | [INFO] [stdout] 45 | let tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(offsets)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:58:24 [INFO] [stdout] | [INFO] [stdout] 58 | let context = &mut *(opaque_ptr as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / unsafe extern "C" fn native_rebalance_cb( [INFO] [stdout] 53 | | rk: *mut RDKafka, [INFO] [stdout] 54 | | err: RDKafkaRespErr, [INFO] [stdout] 55 | | native_tpl: *mut RDKafkaTopicPartitionList, [INFO] [stdout] 56 | | opaque_ptr: *mut c_void, [INFO] [stdout] 57 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::client::NativeClient::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:59:43 [INFO] [stdout] | [INFO] [stdout] 59 | let native_client = ManuallyDrop::new(NativeClient::from_ptr(rk)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::topic_partition_list::TopicPartitionList::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:60:37 [INFO] [stdout] | [INFO] [stdout] 60 | let mut tpl = ManuallyDrop::new(TopicPartitionList::from_ptr(native_tpl)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:13 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:746:9 [INFO] [stdout] | [INFO] [stdout] 746 | / unsafe extern "C" fn native_message_queue_nonempty_cb( [INFO] [stdout] 747 | | _: *mut RDKafka, [INFO] [stdout] 748 | | opaque_ptr: *mut c_void, [INFO] [stdout] 749 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:15 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:37:19 [INFO] [stdout] | [INFO] [stdout] 37 | let wakers = &*(opaque_ptr as *const WakerSlab); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | unsafe extern "C" fn native_message_queue_nonempty_cb(_: *mut RDKafka, opaque_ptr: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | / rdsys::rd_kafka_queue_cb_event_enable( [INFO] [stdout] 43 | | queue.ptr(), [INFO] [stdout] 44 | | Some(native_message_queue_nonempty_cb), [INFO] [stdout] 45 | | Arc::as_ptr(wakers) as *mut c_void, [INFO] [stdout] 46 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | unsafe fn enable_nonempty_callback(queue: &NativeQueue, wakers: &Arc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | rdsys::rd_kafka_queue_cb_event_enable(queue.ptr(), None, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | unsafe fn disable_nonempty_callback(queue: &NativeQueue) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:13 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/base_consumer.rs:746:9 [INFO] [stdout] | [INFO] [stdout] 746 | / unsafe extern "C" fn native_message_queue_nonempty_cb( [INFO] [stdout] 747 | | _: *mut RDKafka, [INFO] [stdout] 748 | | opaque_ptr: *mut c_void, [INFO] [stdout] 749 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/base_consumer.rs:751:15 [INFO] [stdout] | [INFO] [stdout] 751 | (**f)(); [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:37:19 [INFO] [stdout] | [INFO] [stdout] 37 | let wakers = &*(opaque_ptr as *const WakerSlab); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | unsafe extern "C" fn native_message_queue_nonempty_cb(_: *mut RDKafka, opaque_ptr: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | / rdsys::rd_kafka_queue_cb_event_enable( [INFO] [stdout] 43 | | queue.ptr(), [INFO] [stdout] 44 | | Some(native_message_queue_nonempty_cb), [INFO] [stdout] 45 | | Arc::as_ptr(wakers) as *mut c_void, [INFO] [stdout] 46 | | ) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | unsafe fn enable_nonempty_callback(queue: &NativeQueue, wakers: &Arc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_queue_cb_event_enable` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | rdsys::rd_kafka_queue_cb_event_enable(queue.ptr(), None, ptr::null_mut()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/consumer/stream_consumer.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | unsafe fn disable_nonempty_callback(queue: &NativeQueue) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/error.rs:60:22 [INFO] [stdout] | [INFO] [stdout] 60 | RDKafkaError(NativePtr::from_ptr(ptr).map(Arc::new)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/error.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn from_ptr(ptr: *mut rdsys::rd_kafka_error_t) -> RDKafkaError { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_group_list_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:143:5 [INFO] [stdout] | [INFO] [stdout] 143 | rdsys::rd_kafka_group_list_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe extern "C" fn drop_group_list(ptr: *mut RDKafkaGroupList) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:149:19 [INFO] [stdout] | [INFO] [stdout] 149 | GroupList(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaGroupList) -> GroupList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:239:10 [INFO] [stdout] | [INFO] [stdout] 239 | &*(headers_ptr as *mut BorrowedHeaders) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / unsafe fn from_native_ptr( [INFO] [stdout] 236 | | _owner: &T, [INFO] [stdout] 237 | | headers_ptr: *mut rdsys::rd_kafka_headers_t, [INFO] [stdout] 238 | | ) -> &BorrowedHeaders { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:360:18 [INFO] [stdout] | [INFO] [stdout] 360 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:355:5 [INFO] [stdout] | [INFO] [stdout] 355 | / pub(crate) unsafe fn from_dr_callback( [INFO] [stdout] 356 | | ptr: *mut RDKafkaMessage, [INFO] [stdout] 357 | | _owner: &'a O, [INFO] [stdout] 358 | | ) -> DeliveryResult<'a> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:363:12 [INFO] [stdout] | [INFO] [stdout] 363 | if (*ptr).err.is_error() { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:365:47 [INFO] [stdout] | [INFO] [stdout] 365 | KafkaError::MessageProduction((*ptr).err.into()), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::ptr_to_opt_mut_slice` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | util::ptr_to_opt_mut_slice((*self.ptr).payload, (*self.ptr).len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:421:5 [INFO] [stdout] | [INFO] [stdout] 421 | unsafe fn payload_mut(&mut self) -> Option<&mut [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/error.rs:60:22 [INFO] [stdout] | [INFO] [stdout] 60 | RDKafkaError(NativePtr::from_ptr(ptr).map(Arc::new)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/error.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn from_ptr(ptr: *mut rdsys::rd_kafka_error_t) -> RDKafkaError { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_metadata_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | rdsys::rd_kafka_metadata_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | unsafe extern "C" fn drop_metadata(ptr: *mut RDKafkaMetadata) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:124:18 [INFO] [stdout] | [INFO] [stdout] 124 | Metadata(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaMetadata) -> Metadata { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:83:33 [INFO] [stdout] | [INFO] [stdout] 83 | let producer_context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | / unsafe extern "C" fn delivery_cb>( [INFO] [stdout] 79 | | _client: *mut RDKafka, [INFO] [stdout] 80 | | msg: *const RDKafkaMessage, [INFO] [stdout] 81 | | opaque: *mut c_void, [INFO] [stdout] 82 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::IntoOpaque::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:27 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:55 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::message::BorrowedMessage::<'a>::from_dr_callback` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:88:27 [INFO] [stdout] | [INFO] [stdout] 88 | let delivery_result = BorrowedMessage::from_dr_callback(msg as *mut RDKafkaMessage, &owner); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_group_list_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:143:5 [INFO] [stdout] | [INFO] [stdout] 143 | rdsys::rd_kafka_group_list_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe extern "C" fn drop_group_list(ptr: *mut RDKafkaGroupList) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/groups.rs:149:19 [INFO] [stdout] | [INFO] [stdout] 149 | GroupList(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/groups.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaGroupList) -> GroupList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:22 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | / unsafe extern "C" fn partitioner_cb>( [INFO] [stdout] 229 | | topic: *const RDKafkaTopic, [INFO] [stdout] 230 | | keydata: *const c_void, [INFO] [stdout] 231 | | keylen: usize, [INFO] [stdout] ... | [INFO] [stdout] 234 | | _msg_opaque: *mut c_void, [INFO] [stdout] 235 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_name` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:37 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::str::from_utf8_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:237:22 [INFO] [stdout] | [INFO] [stdout] 237 | let topic_name = str::from_utf8_unchecked(topic_name.to_bytes()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_partition_available` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:239:43 [INFO] [stdout] | [INFO] [stdout] 239 | let is_partition_available = |p: i32| rdsys::rd_kafka_topic_partition_available(topic, p) == 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:244:14 [INFO] [stdout] | [INFO] [stdout] 244 | Some(slice::from_raw_parts(keydata as *const u8, keylen)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:247:33 [INFO] [stdout] | [INFO] [stdout] 247 | let producer_context = &mut *(rkt_opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:239:10 [INFO] [stdout] | [INFO] [stdout] 239 | &*(headers_ptr as *mut BorrowedHeaders) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | / unsafe fn from_native_ptr( [INFO] [stdout] 236 | | _owner: &T, [INFO] [stdout] 237 | | headers_ptr: *mut rdsys::rd_kafka_headers_t, [INFO] [stdout] 238 | | ) -> &BorrowedHeaders { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:360:18 [INFO] [stdout] | [INFO] [stdout] 360 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:355:5 [INFO] [stdout] | [INFO] [stdout] 355 | / pub(crate) unsafe fn from_dr_callback( [INFO] [stdout] 356 | | ptr: *mut RDKafkaMessage, [INFO] [stdout] 357 | | _owner: &'a O, [INFO] [stdout] 358 | | ) -> DeliveryResult<'a> { [INFO] [stdout] | |___________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:363:12 [INFO] [stdout] | [INFO] [stdout] 363 | if (*ptr).err.is_error() { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:365:47 [INFO] [stdout] | [INFO] [stdout] 365 | KafkaError::MessageProduction((*ptr).err.into()), [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::ptr_to_opt_mut_slice` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/message.rs:422:9 [INFO] [stdout] | [INFO] [stdout] 422 | util::ptr_to_opt_mut_slice((*self.ptr).payload, (*self.ptr).len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/message.rs:421:5 [INFO] [stdout] | [INFO] [stdout] 421 | unsafe fn payload_mut(&mut self) -> Option<&mut [u8]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_metadata_destroy` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:118:5 [INFO] [stdout] | [INFO] [stdout] 118 | rdsys::rd_kafka_metadata_destroy(ptr as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:117:1 [INFO] [stdout] | [INFO] [stdout] 117 | unsafe extern "C" fn drop_metadata(ptr: *mut RDKafkaMetadata) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/metadata.rs:124:18 [INFO] [stdout] | [INFO] [stdout] 124 | Metadata(NativePtr::from_ptr(ptr as *mut _).unwrap()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/metadata.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | pub(crate) unsafe fn from_ptr(ptr: *const RDKafkaMetadata) -> Metadata { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:83:33 [INFO] [stdout] | [INFO] [stdout] 83 | let producer_context = &mut *(opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:78:1 [INFO] [stdout] | [INFO] [stdout] 78 | / unsafe extern "C" fn delivery_cb>( [INFO] [stdout] 79 | | _client: *mut RDKafka, [INFO] [stdout] 80 | | msg: *const RDKafkaMessage, [INFO] [stdout] 81 | | opaque: *mut c_void, [INFO] [stdout] 82 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::IntoOpaque::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:27 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:84:55 [INFO] [stdout] | [INFO] [stdout] 84 | let delivery_opaque = C::DeliveryOpaque::from_ptr((*msg)._private); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::message::BorrowedMessage::<'a>::from_dr_callback` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:88:27 [INFO] [stdout] | [INFO] [stdout] 88 | let delivery_result = BorrowedMessage::from_dr_callback(msg as *mut RDKafkaMessage, &owner); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:22 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/producer/base_producer.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | / unsafe extern "C" fn partitioner_cb>( [INFO] [stdout] 229 | | topic: *const RDKafkaTopic, [INFO] [stdout] 230 | | keydata: *const c_void, [INFO] [stdout] 231 | | keylen: usize, [INFO] [stdout] ... | [INFO] [stdout] 234 | | _msg_opaque: *mut c_void, [INFO] [stdout] 235 | | ) -> i32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_name` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:236:37 [INFO] [stdout] | [INFO] [stdout] 236 | let topic_name = CStr::from_ptr(rdsys::rd_kafka_topic_name(topic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::str::from_utf8_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:237:22 [INFO] [stdout] | [INFO] [stdout] 237 | let topic_name = str::from_utf8_unchecked(topic_name.to_bytes()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `rdkafka_sys::rd_kafka_topic_partition_available` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:239:43 [INFO] [stdout] | [INFO] [stdout] 239 | let is_partition_available = |p: i32| rdsys::rd_kafka_topic_partition_available(topic, p) == 1; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:244:14 [INFO] [stdout] | [INFO] [stdout] 244 | Some(slice::from_raw_parts(keydata as *const u8, keylen)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/std/producer/base_producer.rs:247:33 [INFO] [stdout] | [INFO] [stdout] 247 | let producer_context = &mut *(rkt_opaque as *mut C); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/topic_partition_list.rs:204:18 [INFO] [stdout] | [INFO] [stdout] 204 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/topic_partition_list.rs:202:5 [INFO] [stdout] | [INFO] [stdout] 202 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaTopicPartitionList) -> TopicPartitionList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | Some(slice::from_raw_parts::(ptr as *const T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:92:1 [INFO] [stdout] | [INFO] [stdout] 92 | pub(crate) unsafe fn ptr_to_opt_slice<'a, T>(ptr: *const c_void, size: usize) -> Option<&'a [T]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | Some(slice::from_raw_parts_mut::(ptr as *mut T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:100:1 [INFO] [stdout] | [INFO] [stdout] 100 | / pub(crate) unsafe fn ptr_to_opt_mut_slice<'a, T>( [INFO] [stdout] 101 | | ptr: *const c_void, [INFO] [stdout] 102 | | size: usize, [INFO] [stdout] 103 | | ) -> Option<&'a mut [T]> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | slice::from_raw_parts::(ptr as *const T, size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:113:1 [INFO] [stdout] | [INFO] [stdout] 113 | pub(crate) unsafe fn ptr_to_slice<'a, T>(ptr: *const c_void, size: usize) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:164:9 [INFO] [stdout] | [INFO] [stdout] 164 | Box::from_raw(ptr as *mut T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:163:5 [INFO] [stdout] | [INFO] [stdout] 163 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:174:9 [INFO] [stdout] | [INFO] [stdout] 174 | Arc::from_raw(ptr as *const T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | CStr::from_ptr(cstr as *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:183:1 [INFO] [stdout] | [INFO] [stdout] 183 | pub unsafe fn cstr_to_owned(cstr: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 1 previous error; 60 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std_::util::NativePtr::::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/topic_partition_list.rs:204:18 [INFO] [stdout] | [INFO] [stdout] 204 | ptr: NativePtr::from_ptr(ptr).unwrap(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/topic_partition_list.rs:202:5 [INFO] [stdout] | [INFO] [stdout] 202 | pub(crate) unsafe fn from_ptr(ptr: *mut RDKafkaTopicPartitionList) -> TopicPartitionList { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `madsim-rdkafka` (lib) due to 2 previous errors; 60 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:96:14 [INFO] [stdout] | [INFO] [stdout] 96 | Some(slice::from_raw_parts::(ptr as *const T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:92:1 [INFO] [stdout] | [INFO] [stdout] 92 | pub(crate) unsafe fn ptr_to_opt_slice<'a, T>(ptr: *const c_void, size: usize) -> Option<&'a [T]> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | Some(slice::from_raw_parts_mut::(ptr as *mut T, size)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:100:1 [INFO] [stdout] | [INFO] [stdout] 100 | / pub(crate) unsafe fn ptr_to_opt_mut_slice<'a, T>( [INFO] [stdout] 101 | | ptr: *const c_void, [INFO] [stdout] 102 | | size: usize, [INFO] [stdout] 103 | | ) -> Option<&'a mut [T]> { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | slice::from_raw_parts::(ptr as *const T, size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:113:1 [INFO] [stdout] | [INFO] [stdout] 113 | pub(crate) unsafe fn ptr_to_slice<'a, T>(ptr: *const c_void, size: usize) -> &'a [T] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:164:9 [INFO] [stdout] | [INFO] [stdout] 164 | Box::from_raw(ptr as *mut T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:163:5 [INFO] [stdout] | [INFO] [stdout] 163 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:174:9 [INFO] [stdout] | [INFO] [stdout] 174 | Arc::from_raw(ptr as *const T) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | unsafe fn from_ptr(ptr: *mut c_void) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ffi::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> src/std/util.rs:184:5 [INFO] [stdout] | [INFO] [stdout] 184 | CStr::from_ptr(cstr as *const c_char) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/std/util.rs:183:1 [INFO] [stdout] | [INFO] [stdout] 183 | pub unsafe fn cstr_to_owned(cstr: *const c_char) -> String { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 1 previous error; 60 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `madsim-rdkafka` (lib test) due to 2 previous errors; 60 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "6a6834b7acb0adf332b6b9d63eea93f99f463f29aaa234e131a8c03f6c9a8883", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6a6834b7acb0adf332b6b9d63eea93f99f463f29aaa234e131a8c03f6c9a8883", kill_on_drop: false }` [INFO] [stdout] 6a6834b7acb0adf332b6b9d63eea93f99f463f29aaa234e131a8c03f6c9a8883