[INFO] fetching crate mijit 0.2.4... [INFO] checking mijit-0.2.4 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate mijit 0.2.4 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate mijit 0.2.4 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] removed /workspace/builds/worker-6-tc2/source/rust-toolchain.toml [INFO] started tweaking crates.io crate mijit 0.2.4 [INFO] finished tweaking crates.io crate mijit 0.2.4 [INFO] tweaked toml for crates.io crate mijit 0.2.4 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 62 packages to latest compatible versions [INFO] [stderr] Adding bad64 v0.6.0 (available: v0.9.0) [INFO] [stderr] Adding bad64-sys v0.5.0 (available: v0.7.0) [INFO] [stderr] Adding bindgen v0.59.2 (available: v0.70.1) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding hashbrown v0.12.3 (available: v0.14.5) [INFO] [stderr] Adding indexmap v1.9.3 (available: v2.5.0) [INFO] [stderr] Adding memoffset v0.8.0 (available: v0.9.1) [INFO] [stderr] Adding num-derive v0.3.3 (available: v0.4.2) [INFO] [stderr] Adding peeking_take_while v0.1.2 (available: v1.0.0) [INFO] [stderr] Adding rustc-hash v1.1.0 (available: v2.0.0) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: `crate_type` is deprecated in favor of `crate-type` and will not work in the 2024 edition [INFO] [stderr] (in the `mijit` library target) [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] f84667a4604c64a43b3fb2701c6911ffd9fe9a2ae09c34db2f573c4a5460ee11 [INFO] running `Command { std: "docker" "start" "-a" "f84667a4604c64a43b3fb2701c6911ffd9fe9a2ae09c34db2f573c4a5460ee11", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "f84667a4604c64a43b3fb2701c6911ffd9fe9a2ae09c34db2f573c4a5460ee11", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f84667a4604c64a43b3fb2701c6911ffd9fe9a2ae09c34db2f573c4a5460ee11", kill_on_drop: false }` [INFO] [stdout] f84667a4604c64a43b3fb2701c6911ffd9fe9a2ae09c34db2f573c4a5460ee11 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 891ab9c672217f5758aaea2a65c1ffa31d356fe069aaed3ffda3517a249ebead [INFO] running `Command { std: "docker" "start" "-a" "891ab9c672217f5758aaea2a65c1ffa31d356fe069aaed3ffda3517a249ebead", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (1 fix) [INFO] [stderr] Compiling libc v0.2.159 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling minimal-lexical v0.2.1 [INFO] [stderr] Compiling regex-syntax v0.8.4 [INFO] [stderr] Compiling memchr v2.7.4 [INFO] [stderr] Compiling bindgen v0.59.2 [INFO] [stderr] Compiling libloading v0.8.5 [INFO] [stderr] Compiling bitflags v1.3.2 [INFO] [stderr] Compiling lazycell v1.3.0 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling rustc-hash v1.1.0 [INFO] [stderr] Compiling peeking_take_while v0.1.2 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling indexmap v1.9.3 [INFO] [stderr] Compiling memoffset v0.8.0 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling clang-sys v1.8.1 [INFO] [stderr] Compiling nom v7.1.3 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Checking cty v0.2.2 [INFO] [stderr] Compiling jobserver v0.1.32 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Checking cstr_core v0.2.6 [INFO] [stderr] Compiling cc v1.1.21 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking memmap v0.7.0 [INFO] [stderr] Checking iced-x86 v1.21.0 [INFO] [stderr] Checking rand_pcg v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking mijit v0.2.4 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Compiling regex-automata v0.4.7 [INFO] [stderr] Compiling cexpr v0.6.0 [INFO] [stderr] Compiling num-derive v0.3.3 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `mijit` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/jit/entry.rs [INFO] [stderr] * src/util/array_map.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/util/array_map.rs:108:25 [INFO] [stderr] | [INFO] [stderr] 108 | debug_name: $debug_name: expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/jit/entry.rs:35:6 [INFO] [stderr] | [INFO] [stderr] 35 | ($self: expr_2021, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/jit/entry.rs:35:24 [INFO] [stderr] | [INFO] [stderr] 35 | ($self: expr_2021, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 3 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/code/ebb.rs:82:49 [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/code/ebb.rs:85:32 [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/code/action.rs:4:3 [INFO] [stdout] | [INFO] [stdout] 4 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/util/array_map.rs:108:38 [INFO] [stdout] | [INFO] [stdout] 108 | debug_name: $debug_name: expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 108 | debug_name: $debug_name: expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/jit/entry.rs:35:13 [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr_2021, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/jit/entry.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/engine.rs:360:13 [INFO] [stdout] | [INFO] [stdout] 360 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/engine.rs:357:5 [INFO] [stdout] | [INFO] [stdout] 357 | pub unsafe fn run(&mut self, label: &Label, global: *mut ()) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::engine::Engine::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/entry.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | self.engine.run(label, global as *mut G as *mut ()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/entry.rs:77:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub unsafe fn run(&mut self, entry: EntryId, global: &mut G) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::entry::Jit::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/mod.rs:499:22 [INFO] [stdout] | [INFO] [stdout] 499 | let result = self.jit.run(self.root, registers); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/mod.rs:498:5 [INFO] [stdout] | [INFO] [stdout] 498 | pub unsafe fn run(&mut self, registers: &mut M0Registers) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:10:11 [INFO] [stdout] | [INFO] [stdout] 10 | while let Some((i, x)) = it.next() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^--------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:22:5 [INFO] [stdout] | [INFO] [stdout] 22 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:11:12 [INFO] [stdout] | [INFO] [stdout] 11 | if let Some(fx) = f(x) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 11 ~ match f(x) { Some(fx) => { [INFO] [stdout] 12 | let mut best = (i, fx); [INFO] [stdout] ... [INFO] [stdout] 20 | return Some(best.0); [INFO] [stdout] 21 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:14:20 [INFO] [stdout] | [INFO] [stdout] 14 | if let Some(fy) = f(y) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:18:17 [INFO] [stdout] | [INFO] [stdout] 18 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 14 ~ match f(y) { Some(fy) => { [INFO] [stdout] 15 | if fy > best.1 { [INFO] [stdout] 16 | best = (j, fy); [INFO] [stdout] 17 | } [INFO] [stdout] 18 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/code/convention.rs:88:16 [INFO] [stdout] | [INFO] [stdout] 88 | if let Some(ref mut ret) = ret { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^--- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/code/convention.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 88 ~ match ret { Some(ref mut ret) => { [INFO] [stdout] 89 | ret.branch(convention); [INFO] [stdout] 90 ~ } _ => { [INFO] [stdout] 91 | ret = Some(Self::new(convention)); [INFO] [stdout] 92 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/code/builder.rs:233:15 [INFO] [stdout] | [INFO] [stdout] 233 | while let Some(Guard {actions, condition, expected, if_fail}) = self.guards.pop() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/code/builder.rs:240:9 [INFO] [stdout] | [INFO] [stdout] 240 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl Iterator` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/optimizer/dataflow.rs:157:32 [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/optimizer/dataflow.rs:157:22 [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator { [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator + use<> { [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl Iterator` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:14:6 [INFO] [stdout] | [INFO] [stdout] 14 | ) -> impl Iterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/optimizer/builder/moves.rs:13:11 [INFO] [stdout] | [INFO] [stdout] 13 | temp: &V, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 14 | ) -> impl Iterator + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | while let Some(src) = dest_to_src.remove(¤t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:32:9 [INFO] [stdout] | [INFO] [stdout] 32 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:39:15 [INFO] [stdout] | [INFO] [stdout] 39 | while let Some(dest) = chain.pop() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:42:9 [INFO] [stdout] | [INFO] [stdout] 42 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:69:12 [INFO] [stdout] | [INFO] [stdout] 69 | if let Some(old) = &self.before { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 69 ~ match &self.before { Some(old) => { [INFO] [stdout] 70 | assert!(new.refines(old)); [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | self.before = Some(new); [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:132:12 [INFO] [stdout] | [INFO] [stdout] 132 | if let Some(jump) = retire.jump { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:135:9 [INFO] [stdout] | [INFO] [stdout] 135 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 132 ~ match retire.jump { Some(jump) => { [INFO] [stdout] 133 | // Jump to a non-root `Case`. [INFO] [stdout] 134 | lo.jump(&mut self[jump].label); [INFO] [stdout] 135 ~ } _ => { [INFO] [stdout] 136 | // Jump to the root. [INFO] [stdout] 137 | lo.epilogue() [INFO] [stdout] 138 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:345:12 [INFO] [stdout] | [INFO] [stdout] 345 | if let Some(ebb) = self.hot_path(id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:347:9 [INFO] [stdout] | [INFO] [stdout] 347 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 345 ~ match self.hot_path(id) { Some(ebb) => { [INFO] [stdout] 346 | self.build(id, &ebb, &|c| c); [INFO] [stdout] 347 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 27 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Compiling regex v1.10.6 [INFO] [stderr] Compiling bad64-sys v0.5.0 [INFO] [stderr] Checking bad64 v0.6.0 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `mijit` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/jit/entry.rs [INFO] [stderr] * src/util/array_map.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/util/array_map.rs:108:25 [INFO] [stderr] | [INFO] [stderr] 108 | debug_name: $debug_name: expr_2021, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/jit/entry.rs:35:6 [INFO] [stderr] | [INFO] [stderr] 35 | ($self: expr_2021, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/jit/entry.rs:35:24 [INFO] [stderr] | [INFO] [stderr] 35 | ($self: expr_2021, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error: aborting due to 3 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/code/ebb.rs:82:49 [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.gen()); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] = note: `--force-warn keyword-idents-2024` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `gen` is a keyword in the 2024 edition [INFO] [stdout] --> src/code/ebb.rs:85:32 [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ^^^ help: you can use a raw identifier to stay compatible: `r#gen` [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #49716 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/code/action.rs:4:3 [INFO] [stdout] | [INFO] [stdout] 4 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/util/array_map.rs:108:38 [INFO] [stdout] | [INFO] [stdout] 108 | debug_name: $debug_name: expr, [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 108 | debug_name: $debug_name: expr_2021, [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/jit/entry.rs:35:13 [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr_2021, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/jit/entry.rs:35:24 [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 35 | ($self: expr, $id: expr_2021) => ($self.entries[$id.as_usize()]) [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:71:17 [INFO] [stdout] | [INFO] [stdout] 71 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | pub unsafe fn run(mut self, inputs: &mut [Word], expected_result: Word) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:116:18 [INFO] [stdout] | [INFO] [stdout] 116 | vm = vm.run( [INFO] [stdout] | __________________^ [INFO] [stdout] 117 | | &mut [Word {u: x}], [INFO] [stdout] 118 | | Word {u: expected(x)}, [INFO] [stdout] 119 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | pub unsafe fn test_unary(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:128:22 [INFO] [stdout] | [INFO] [stdout] 128 | vm = vm.run( [INFO] [stdout] | ______________________^ [INFO] [stdout] 129 | | &mut [Word {u: x}, Word {u: y}], [INFO] [stdout] 130 | | Word {u: expected(x, y)}, [INFO] [stdout] 131 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:124:5 [INFO] [stdout] | [INFO] [stdout] 124 | pub unsafe fn test_binary(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64, u64) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | vm = vm.run( [INFO] [stdout] | __________________^ [INFO] [stdout] 142 | | &mut [Word {mp: memory.as_mut_ptr() as *mut ()}], [INFO] [stdout] 143 | | Word {u: expected(x, &mut memory)}, [INFO] [stdout] 144 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | pub unsafe fn test_mem(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64, &mut [u64; 2]) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:162:26 [INFO] [stdout] | [INFO] [stdout] 162 | vm = vm.run( [INFO] [stdout] | __________________________^ [INFO] [stdout] 163 | | &mut [Word {u: x}, Word {u: y}], [INFO] [stdout] 164 | | Word {u: 0}, [INFO] [stdout] 165 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | / pub unsafe fn test_clobber( [INFO] [stdout] 152 | | compile: impl Fn(&mut dyn Lower, Register, Register, Register), [INFO] [stdout] 153 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 17.30s [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/engine.rs:360:13 [INFO] [stdout] | [INFO] [stdout] 360 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/engine.rs:357:5 [INFO] [stdout] | [INFO] [stdout] 357 | pub unsafe fn run(&mut self, label: &Label, global: *mut ()) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::engine::Engine::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/entry.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | self.engine.run(label, global as *mut G as *mut ()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/entry.rs:77:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub unsafe fn run(&mut self, entry: EntryId, global: &mut G) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::entry::Jit::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/mod.rs:499:22 [INFO] [stdout] | [INFO] [stdout] 499 | let result = self.jit.run(self.root, registers); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/mod.rs:498:5 [INFO] [stdout] | [INFO] [stdout] 498 | pub unsafe fn run(&mut self, registers: &mut M0Registers) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `beetle::Beetle::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/tests.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | self.beetle.run(&mut self.state); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/tests.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | pub unsafe fn run(&mut self, ep: u32) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:10:11 [INFO] [stdout] | [INFO] [stdout] 10 | while let Some((i, x)) = it.next() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^--------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:22:5 [INFO] [stdout] | [INFO] [stdout] 22 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:11:12 [INFO] [stdout] | [INFO] [stdout] 11 | if let Some(fx) = f(x) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 11 ~ match f(x) { Some(fx) => { [INFO] [stdout] 12 | let mut best = (i, fx); [INFO] [stdout] ... [INFO] [stdout] 20 | return Some(best.0); [INFO] [stdout] 21 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/util/iter.rs:14:20 [INFO] [stdout] | [INFO] [stdout] 14 | if let Some(fy) = f(y) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/util/iter.rs:18:17 [INFO] [stdout] | [INFO] [stdout] 18 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 14 ~ match f(y) { Some(fy) => { [INFO] [stdout] 15 | if fy > best.1 { [INFO] [stdout] 16 | best = (j, fy); [INFO] [stdout] 17 | } [INFO] [stdout] 18 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/code/convention.rs:88:16 [INFO] [stdout] | [INFO] [stdout] 88 | if let Some(ref mut ret) = ret { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^--- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/code/convention.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 88 ~ match ret { Some(ref mut ret) => { [INFO] [stdout] 89 | ret.branch(convention); [INFO] [stdout] 90 ~ } _ => { [INFO] [stdout] 91 | ret = Some(Self::new(convention)); [INFO] [stdout] 92 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/code/builder.rs:233:15 [INFO] [stdout] | [INFO] [stdout] 233 | while let Some(Guard {actions, condition, expected, if_fail}) = self.guards.pop() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/code/builder.rs:240:9 [INFO] [stdout] | [INFO] [stdout] 240 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl Iterator` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/optimizer/dataflow.rs:157:32 [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/optimizer/dataflow.rs:157:22 [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator { [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] = note: `--force-warn impl-trait-overcaptures` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 157 | pub fn all_nodes(&self) -> impl Iterator + use<> { [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `impl Iterator` will capture more lifetimes than possibly intended in edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:14:6 [INFO] [stdout] | [INFO] [stdout] 14 | ) -> impl Iterator { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see [INFO] [stdout] note: specifically, this lifetime is in scope but not mentioned in the type's bounds [INFO] [stdout] --> src/optimizer/builder/moves.rs:13:11 [INFO] [stdout] | [INFO] [stdout] 13 | temp: &V, [INFO] [stdout] | ^ [INFO] [stdout] = note: all lifetimes in scope will be captured by `impl Trait`s in edition 2024 [INFO] [stdout] help: use the precise capturing `use<...>` syntax to make the captures explicit [INFO] [stdout] | [INFO] [stdout] 14 | ) -> impl Iterator + use { [INFO] [stdout] | ++++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | while let Some(src) = dest_to_src.remove(¤t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:32:9 [INFO] [stdout] | [INFO] [stdout] 32 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:39:15 [INFO] [stdout] | [INFO] [stdout] 39 | while let Some(dest) = chain.pop() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/optimizer/builder/moves.rs:42:9 [INFO] [stdout] | [INFO] [stdout] 42 | } [INFO] [stdout] | ^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:69:12 [INFO] [stdout] | [INFO] [stdout] 69 | if let Some(old) = &self.before { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^----------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 69 ~ match &self.before { Some(old) => { [INFO] [stdout] 70 | assert!(new.refines(old)); [INFO] [stdout] 71 ~ } _ => { [INFO] [stdout] 72 | self.before = Some(new); [INFO] [stdout] 73 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:132:12 [INFO] [stdout] | [INFO] [stdout] 132 | if let Some(jump) = retire.jump { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:135:9 [INFO] [stdout] | [INFO] [stdout] 135 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 132 ~ match retire.jump { Some(jump) => { [INFO] [stdout] 133 | // Jump to a non-root `Case`. [INFO] [stdout] 134 | lo.jump(&mut self[jump].label); [INFO] [stdout] 135 ~ } _ => { [INFO] [stdout] 136 | // Jump to the root. [INFO] [stdout] 137 | lo.epilogue() [INFO] [stdout] 138 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:345:12 [INFO] [stdout] | [INFO] [stdout] 345 | if let Some(ebb) = self.hot_path(id) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/jit/engine.rs:347:9 [INFO] [stdout] | [INFO] [stdout] 347 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 345 ~ match self.hot_path(id) { Some(ebb) => { [INFO] [stdout] 346 | self.build(id, &ebb, &|c| c); [INFO] [stdout] 347 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 33 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking mijit v0.2.4 (/tmp/fixit) [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/code/ebb.rs:82:49 [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.gen()); [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.r#gen()); [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/code/ebb.rs:85:32 [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.r#gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/code/ebb.rs:82:49 [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.gen()); [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 82 | b.const_binary64(Add, r, r, rng.r#gen()); [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: expected identifier, found reserved keyword `gen` [INFO] [stdout] --> src/code/ebb.rs:85:32 [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ^^^ expected identifier, found reserved keyword [INFO] [stdout] | [INFO] [stdout] help: escape `gen` to use it as an identifier [INFO] [stdout] | [INFO] [stdout] 85 | b.guard(r, rng.r#gen(), builder::build(|b| b.jump(leaf))); [INFO] [stdout] | ++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/code/action.rs:4:3 [INFO] [stdout] | [INFO] [stdout] 4 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/code/action.rs:4:3 [INFO] [stdout] | [INFO] [stdout] 4 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/engine.rs:360:13 [INFO] [stdout] | [INFO] [stdout] 360 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/engine.rs:357:5 [INFO] [stdout] | [INFO] [stdout] 357 | pub unsafe fn run(&mut self, label: &Label, global: *mut ()) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::engine::Engine::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/entry.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | self.engine.run(label, global as *mut G as *mut ()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/entry.rs:77:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub unsafe fn run(&mut self, entry: EntryId, global: &mut G) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::entry::Jit::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/mod.rs:499:22 [INFO] [stdout] | [INFO] [stdout] 499 | let result = self.jit.run(self.root, registers); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/mod.rs:498:5 [INFO] [stdout] | [INFO] [stdout] 498 | pub unsafe fn run(&mut self, registers: &mut M0Registers) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 3 previous errors; 9 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `mijit` (lib) due to 4 previous errors; 9 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/util/usage.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// An index into a `Usage`. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq, PartialOrd, Ord)] [INFO] [stdout] 11 | | pub struct Use(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:71:17 [INFO] [stdout] | [INFO] [stdout] 71 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | pub unsafe fn run(mut self, inputs: &mut [Word], expected_result: Word) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:116:18 [INFO] [stdout] | [INFO] [stdout] 116 | vm = vm.run( [INFO] [stdout] | __________________^ [INFO] [stdout] 117 | | &mut [Word {u: x}], [INFO] [stdout] 118 | | Word {u: expected(x)}, [INFO] [stdout] 119 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | pub unsafe fn test_unary(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:128:22 [INFO] [stdout] | [INFO] [stdout] 128 | vm = vm.run( [INFO] [stdout] | ______________________^ [INFO] [stdout] 129 | | &mut [Word {u: x}, Word {u: y}], [INFO] [stdout] 130 | | Word {u: expected(x, y)}, [INFO] [stdout] 131 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:124:5 [INFO] [stdout] | [INFO] [stdout] 124 | pub unsafe fn test_binary(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64, u64) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:141:18 [INFO] [stdout] | [INFO] [stdout] 141 | vm = vm.run( [INFO] [stdout] | __________________^ [INFO] [stdout] 142 | | &mut [Word {mp: memory.as_mut_ptr() as *mut ()}], [INFO] [stdout] 143 | | Word {u: expected(x, &mut memory)}, [INFO] [stdout] 144 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:137:5 [INFO] [stdout] | [INFO] [stdout] 137 | pub unsafe fn test_mem(compile: impl FnOnce(&mut dyn Lower), expected: impl Fn(u64, &mut [u64; 2]) -> u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `target::tests::VM::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/target/mod.rs:162:26 [INFO] [stdout] | [INFO] [stdout] 162 | vm = vm.run( [INFO] [stdout] | __________________________^ [INFO] [stdout] 163 | | &mut [Word {u: x}, Word {u: y}], [INFO] [stdout] 164 | | Word {u: 0}, [INFO] [stdout] 165 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/target/mod.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | / pub unsafe fn test_clobber( [INFO] [stdout] 152 | | compile: impl Fn(&mut dyn Lower, Register, Register, Register), [INFO] [stdout] 153 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/code/variable.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | / array_index! { [INFO] [stdout] 7 | | /// Names an allocatable register. The mapping of [`Register`]s onto CPU [INFO] [stdout] 8 | | /// registers is an implementation detail of a [`Target`], which may also [INFO] [stdout] 9 | | /// reserve a few CPU registers for special purposes. [INFO] [stdout] ... | [INFO] [stdout] 20 | | } [INFO] [stdout] 21 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/dataflow.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | / array_index! { [INFO] [stdout] 9 | | /// A node in a Dataflow graph. Also represents the value it computes. [INFO] [stdout] 10 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 11 | | pub struct Node(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 14 | | } [INFO] [stdout] 15 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/optimizer/builder/allocator/placer.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// A time in cycles. We are agnostic as to whether `Time` runs forwards or [INFO] [stdout] 9 | | /// backwards; you can use it to generate code in either direction. [INFO] [stdout] 10 | | /// Therefore, we use the terminology "larger" and "smaller", not "earlier" [INFO] [stdout] ... | [INFO] [stdout] 16 | | } [INFO] [stdout] 17 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/engine.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | / array_index! { [INFO] [stdout] 13 | | /// Identifies a [`Case`] of an [`Engine`]. [INFO] [stdout] 14 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 15 | | pub struct CaseId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 18 | | } [INFO] [stdout] 19 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/engine.rs:360:13 [INFO] [stdout] | [INFO] [stdout] 360 | f(global) [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/engine.rs:357:5 [INFO] [stdout] | [INFO] [stdout] 357 | pub unsafe fn run(&mut self, label: &Label, global: *mut ()) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::num::NonZero::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/util/array_map.rs:126:22 [INFO] [stdout] | [INFO] [stdout] 126 | Self(<$NonZeroUInt>::new_unchecked(index + 1)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/util/array_map.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | pub const unsafe fn new_unchecked(index: $UInt) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/jit/entry.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | / array_index! { [INFO] [stdout] 8 | | /// Identifies an entry point of an [`Jit`]. [INFO] [stdout] 9 | | #[derive(Copy, Clone, Hash, PartialEq, Eq)] [INFO] [stdout] 10 | | pub struct EntryId(std::num::NonZeroUsize) { [INFO] [stdout] ... | [INFO] [stdout] 13 | | } [INFO] [stdout] 14 | | } [INFO] [stdout] | |_- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `array_index` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::engine::Engine::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/jit/entry.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | self.engine.run(label, global as *mut G as *mut ()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/jit/entry.rs:77:5 [INFO] [stdout] | [INFO] [stdout] 77 | pub unsafe fn run(&mut self, entry: EntryId, global: &mut G) -> Word { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `jit::entry::Jit::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/mod.rs:499:22 [INFO] [stdout] | [INFO] [stdout] 499 | let result = self.jit.run(self.root, registers); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/mod.rs:498:5 [INFO] [stdout] | [INFO] [stdout] 498 | pub unsafe fn run(&mut self, registers: &mut M0Registers) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `beetle::Beetle::::run` is unsafe and requires unsafe block [INFO] [stdout] --> src/beetle/tests.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | self.beetle.run(&mut self.state); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/beetle/tests.rs:113:5 [INFO] [stdout] | [INFO] [stdout] 113 | pub unsafe fn run(&mut self, ep: u32) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 3 previous errors; 15 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `mijit` (lib test) due to 4 previous errors; 15 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "891ab9c672217f5758aaea2a65c1ffa31d356fe069aaed3ffda3517a249ebead", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "891ab9c672217f5758aaea2a65c1ffa31d356fe069aaed3ffda3517a249ebead", kill_on_drop: false }` [INFO] [stdout] 891ab9c672217f5758aaea2a65c1ffa31d356fe069aaed3ffda3517a249ebead