[INFO] fetching crate near-vm-vm 0.26.0... [INFO] checking near-vm-vm-0.26.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate near-vm-vm 0.26.0 into /workspace/builds/worker-4-tc2/source [INFO] validating manifest of crates.io crate near-vm-vm 0.26.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate near-vm-vm 0.26.0 [INFO] finished tweaking crates.io crate near-vm-vm 0.26.0 [INFO] tweaked toml for crates.io crate near-vm-vm 0.26.0 written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 81 packages to latest compatible versions [INFO] [stderr] Adding ahash v0.7.8 (available: v0.8.11) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding bytecheck v0.6.12 (available: v0.8.0) [INFO] [stderr] Adding bytecheck_derive v0.6.12 (available: v0.8.0) [INFO] [stderr] Adding hashbrown v0.12.3 (available: v0.14.5) [INFO] [stderr] Adding idna v0.5.0 (available: v1.0.2) [INFO] [stderr] Adding indexmap v1.9.3 (available: v2.5.0) [INFO] [stderr] Adding memoffset v0.8.0 (available: v0.9.1) [INFO] [stderr] Adding more-asserts v0.2.2 (available: v0.3.1) [INFO] [stderr] Adding ptr_meta v0.1.4 (available: v0.3.0) [INFO] [stderr] Adding ptr_meta_derive v0.1.4 (available: v0.3.0) [INFO] [stderr] Adding radium v0.7.0 (available: v1.1.0) [INFO] [stderr] Adding rend v0.4.2 (available: v0.5.1) [INFO] [stderr] Adding rkyv v0.7.45 (available: v0.8.8) [INFO] [stderr] Adding rkyv_derive v0.7.45 (available: v0.8.8) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding wasmparser v0.105.0 (available: v0.217.0) [INFO] [stderr] Adding wasmprinter v0.2.57 (available: v0.2.80) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] [stderr] Adding wyz v0.5.1 (available: v0.6.1) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] c6765a66059951c474db8efc5a102671fc5d9d88e28caec73ee136260cda753f [INFO] running `Command { std: "docker" "start" "-a" "c6765a66059951c474db8efc5a102671fc5d9d88e28caec73ee136260cda753f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "c6765a66059951c474db8efc5a102671fc5d9d88e28caec73ee136260cda753f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c6765a66059951c474db8efc5a102671fc5d9d88e28caec73ee136260cda753f", kill_on_drop: false }` [INFO] [stdout] c6765a66059951c474db8efc5a102671fc5d9d88e28caec73ee136260cda753f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f7fc13f160cc013e15b9ae344002be35e952920ce899de8f9a20786734a819ff [INFO] running `Command { std: "docker" "start" "-a" "f7fc13f160cc013e15b9ae344002be35e952920ce899de8f9a20786734a819ff", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Compiling ahash v0.7.8 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Compiling rkyv v0.7.45 [INFO] [stderr] Compiling memoffset v0.8.0 [INFO] [stderr] Compiling finite-wasm v0.5.0 [INFO] [stderr] Checking seahash v4.1.0 [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking bitvec v1.0.1 [INFO] [stderr] Checking miniz_oxide v0.8.0 [INFO] [stderr] Compiling near-vm-vm v0.26.0 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Checking prefix-sum-vec v0.1.2 [INFO] [stderr] Checking dissimilar v1.0.9 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Checking region v3.0.2 [INFO] [stderr] Checking object v0.36.4 [INFO] [stderr] Checking more-asserts v0.2.2 [INFO] [stderr] Checking indexmap v1.9.3 [INFO] [stderr] Checking wasmparser v0.105.0 [INFO] [stderr] Compiling ptr_meta_derive v0.1.4 [INFO] [stderr] Compiling rkyv_derive v0.7.45 [INFO] [stderr] Checking ptr_meta v0.1.4 [INFO] [stderr] Checking backtrace v0.3.74 [INFO] [stderr] Compiling thiserror-impl v1.0.64 [INFO] [stderr] Compiling tracing-attributes v0.1.27 [INFO] [stderr] Checking wasmprinter v0.2.57 [INFO] [stderr] Checking thiserror v1.0.64 [INFO] [stderr] Checking tracing v0.1.40 [INFO] [stderr] Checking near-vm-types v0.26.0 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `near_vm_vm` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/export/mod.rs [INFO] [stderr] * src/export/vmmemory.rs [INFO] [stderr] * src/imports.rs [INFO] [stderr] * src/instance/mod.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/vmcontext.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error: expected item after doc comment [INFO] [stderr] --> src/instance/mod.rs:1148:1 [INFO] [stderr] | [INFO] [stderr] 1142 | / /// Initializes the host environments. [INFO] [stderr] 1143 | | /// [INFO] [stderr] 1144 | | /// # Safety [INFO] [stderr] 1145 | | /// - This function must be called with the correct `Err` type parameter: the error type is not [INFO] [stderr] 1146 | | /// visible to code in `near_vm_vm`, so it's the caller's responsibility to ensure these [INFO] [stderr] 1147 | | /// functions are called with the correct type. [INFO] [stderr] | |_________________________________________________- other attributes here [INFO] [stderr] 1148 | /// - `instance_ptr` must point to a valid `near_vm_test_api::Instance`. [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this doc comment doesn't document anything [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/export/mod.rs:5:5 [INFO] [stderr] | [INFO] [stderr] 5 | use crate::instance::WeakOrStrongInstanceRef; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/export/vmmemory.rs:1:5 [INFO] [stderr] | [INFO] [stderr] 1 | use crate::instance::WeakOrStrongInstanceRef; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] | [INFO] [stderr] help: consider importing this unresolved item through its public re-export instead [INFO] [stderr] | [INFO] [stderr] 1 | use crate::export::WeakOrStrongInstanceRef; [INFO] [stderr] | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::ImportFunctionEnv` [INFO] [stderr] --> src/imports.rs:4:5 [INFO] [stderr] | [INFO] [stderr] 4 | use crate::instance::ImportFunctionEnv; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ImportFunctionEnv` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::Instance` [INFO] [stderr] --> src/vmcontext.rs:9:5 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::instance::Instance; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ no `Instance` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::instance::initialize_host_envs`, `crate::instance::ImportFunctionEnv`, `crate::instance::ImportInitializerFuncPtr`, `crate::instance::InstanceAllocator`, `crate::instance::InstanceHandle`, `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/lib.rs:41:5 [INFO] [stderr] | [INFO] [stderr] 41 | initialize_host_envs, ImportFunctionEnv, ImportInitializerFuncPtr, InstanceAllocator, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ no `InstanceAllocator` in `instance` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `ImportInitializerFuncPtr` in `instance` [INFO] [stderr] | | no `ImportFunctionEnv` in `instance` [INFO] [stderr] | no `initialize_host_envs` in `instance` [INFO] [stderr] 42 | InstanceHandle, WeakOrStrongInstanceRef, [INFO] [stderr] | ^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] | | [INFO] [stderr] | no `InstanceHandle` in `instance` [INFO] [stderr] [INFO] [stderr] error: aborting due to 6 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0432`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 53 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:65:3 [INFO] [stdout] | [INFO] [stdout] 65 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 65 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:98:3 [INFO] [stdout] | [INFO] [stdout] 98 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 98 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:104:3 [INFO] [stdout] | [INFO] [stdout] 104 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 104 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:110:3 [INFO] [stdout] | [INFO] [stdout] 110 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 110 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:117:3 [INFO] [stdout] | [INFO] [stdout] 117 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 117 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:197:3 [INFO] [stdout] | [INFO] [stdout] 197 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 197 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:213:3 [INFO] [stdout] | [INFO] [stdout] 213 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 213 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:240:3 [INFO] [stdout] | [INFO] [stdout] 240 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 240 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:265:3 [INFO] [stdout] | [INFO] [stdout] 265 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 265 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:307:3 [INFO] [stdout] | [INFO] [stdout] 307 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 307 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:323:3 [INFO] [stdout] | [INFO] [stdout] 323 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 323 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:344:3 [INFO] [stdout] | [INFO] [stdout] 344 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 344 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:368:3 [INFO] [stdout] | [INFO] [stdout] 368 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 368 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:423:3 [INFO] [stdout] | [INFO] [stdout] 423 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 423 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:445:3 [INFO] [stdout] | [INFO] [stdout] 445 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 445 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:468:3 [INFO] [stdout] | [INFO] [stdout] 468 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 468 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:483:3 [INFO] [stdout] | [INFO] [stdout] 483 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 483 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:496:3 [INFO] [stdout] | [INFO] [stdout] 496 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 496 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:506:3 [INFO] [stdout] | [INFO] [stdout] 506 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 506 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:518:3 [INFO] [stdout] | [INFO] [stdout] 518 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 518 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:541:3 [INFO] [stdout] | [INFO] [stdout] 541 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 541 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:564:3 [INFO] [stdout] | [INFO] [stdout] 564 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 564 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:587:3 [INFO] [stdout] | [INFO] [stdout] 587 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 587 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:610:3 [INFO] [stdout] | [INFO] [stdout] 610 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 610 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:635:3 [INFO] [stdout] | [INFO] [stdout] 635 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 635 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:648:3 [INFO] [stdout] | [INFO] [stdout] 648 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 648 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:660:3 [INFO] [stdout] | [INFO] [stdout] 660 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 660 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/probestack.rs:58:9 [INFO] [stdout] | [INFO] [stdout] 58 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 59 | | pub fn __rust_probestack(); [INFO] [stdout] 60 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/trap/traphandlers.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 18 | | fn near_vm_register_setjmp( [INFO] [stdout] 19 | | jmp_buf: *mut *const u8, [INFO] [stdout] 20 | | callback: extern "C" fn(*mut u8), [INFO] [stdout] ... | [INFO] [stdout] 23 | | fn near_vm_unwind(jmp_buf: *const u8) -> !; [INFO] [stdout] 24 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `global::Global::set_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.set_unchecked(val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn set(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:117:31 [INFO] [stdout] | [INFO] [stdout] 117 | let definition = &mut *self.vm_global_definition.get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn set_unchecked(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:119:31 [INFO] [stdout] | [INFO] [stdout] 119 | Value::I32(i) => *definition.as_i32_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:120:31 [INFO] [stdout] | [INFO] [stdout] 120 | Value::I64(i) => *definition.as_i64_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:121:31 [INFO] [stdout] | [INFO] [stdout] 121 | Value::F32(f) => *definition.as_f32_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:122:31 [INFO] [stdout] | [INFO] [stdout] 122 | Value::F64(f) => *definition.as_f64_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_bytes_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:123:32 [INFO] [stdout] | [INFO] [stdout] 123 | Value::V128(x) => *definition.as_bytes_mut() = x.to_ne_bytes(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_externref_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:125:34 [INFO] [stdout] | [INFO] [stdout] 125 | let extern_ref = definition.as_externref_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:129:38 [INFO] [stdout] | [INFO] [stdout] 129 | Value::FuncRef(None) => *definition.as_u128_mut() = 0, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `near_vm_types::WasmValueType::write_value_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:17 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:34 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:129:24 [INFO] [stdout] | [INFO] [stdout] 129 | let base_ptr = ptr.add(mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:122:5 [INFO] [stdout] | [INFO] [stdout] 122 | unsafe fn memory_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:27 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:50 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:161:24 [INFO] [stdout] | [INFO] [stdout] 161 | let base_ptr = ptr.add(std::mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn table_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:27 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:50 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | ptr::drop_in_place(instance_ptr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | unsafe fn deallocate_instance(&mut self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | std::alloc::dealloc(instance_ptr as *mut u8, self.instance_layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:147:15 [INFO] [stdout] | [INFO] [stdout] 147 | (&mut *ptr).as_mut() [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:145:5 [INFO] [stdout] | [INFO] [stdout] 145 | pub(super) unsafe fn as_mut_unchecked(&mut self) -> &mut Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | (self.vmctx_ptr() as *mut u8).add(usize::try_from(offset).unwrap()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:182:5 [INFO] [stdout] | [INFO] [stdout] 182 | unsafe fn vmctx_plus_offset(&self, offset: u32) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:878:17 [INFO] [stdout] | [INFO] [stdout] 878 | *(instance.trap_catcher_ptr()) = get_trap_handler(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:830:5 [INFO] [stdout] | [INFO] [stdout] 830 | / pub unsafe fn new( [INFO] [stdout] 831 | | artifact: Arc, [INFO] [stdout] 832 | | allocator: InstanceAllocator, [INFO] [stdout] 833 | | finished_memories: BoxedSlice>, [INFO] [stdout] ... | [INFO] [stdout] 840 | | instance_config: InstanceConfig, [INFO] [stdout] 841 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:879:17 [INFO] [stdout] | [INFO] [stdout] 879 | *(instance.gas_counter_ptr()) = instance_config.gas_counter; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:880:17 [INFO] [stdout] | [INFO] [stdout] 880 | *(instance.stack_limit_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:881:17 [INFO] [stdout] | [INFO] [stdout] 881 | *(instance.stack_limit_initial_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:888:9 [INFO] [stdout] | [INFO] [stdout] 888 | / ptr::copy( [INFO] [stdout] 889 | | instance.artifact.signatures().as_ptr(), [INFO] [stdout] 890 | | instance.signature_ids_ptr() as *mut VMSharedSignatureIndex, [INFO] [stdout] 891 | | instance.artifact.signatures().len(), [INFO] [stdout] 892 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:894:9 [INFO] [stdout] | [INFO] [stdout] 894 | / ptr::copy( [INFO] [stdout] 895 | | imports.functions.values().as_slice().as_ptr(), [INFO] [stdout] 896 | | instance.imported_functions_ptr() as *mut VMFunctionImport, [INFO] [stdout] 897 | | imports.functions.len(), [INFO] [stdout] 898 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:899:9 [INFO] [stdout] | [INFO] [stdout] 899 | / ptr::copy( [INFO] [stdout] 900 | | imports.tables.values().as_slice().as_ptr(), [INFO] [stdout] 901 | | instance.imported_tables_ptr() as *mut VMTableImport, [INFO] [stdout] 902 | | imports.tables.len(), [INFO] [stdout] 903 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:904:9 [INFO] [stdout] | [INFO] [stdout] 904 | / ptr::copy( [INFO] [stdout] 905 | | imports.memories.values().as_slice().as_ptr(), [INFO] [stdout] 906 | | instance.imported_memories_ptr() as *mut VMMemoryImport, [INFO] [stdout] 907 | | imports.memories.len(), [INFO] [stdout] 908 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:909:9 [INFO] [stdout] | [INFO] [stdout] 909 | / ptr::copy( [INFO] [stdout] 910 | | imports.globals.values().as_slice().as_ptr(), [INFO] [stdout] 911 | | instance.imported_globals_ptr() as *mut VMGlobalImport, [INFO] [stdout] 912 | | imports.globals.len(), [INFO] [stdout] 913 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:917:9 [INFO] [stdout] | [INFO] [stdout] 917 | / ptr::copy( [INFO] [stdout] 918 | | vmctx_globals.values().as_slice().as_ptr(), [INFO] [stdout] 919 | | instance.globals_ptr() as *mut NonNull, [INFO] [stdout] 920 | | vmctx_globals.len(), [INFO] [stdout] 921 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:922:9 [INFO] [stdout] | [INFO] [stdout] 922 | / ptr::write( [INFO] [stdout] 923 | | instance.builtin_functions_ptr() as *mut VMBuiltinFunctionsArray, [INFO] [stdout] 924 | | VMBuiltinFunctionsArray::initialized(), [INFO] [stdout] 925 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_call_trampoline` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:970:9 [INFO] [stdout] | [INFO] [stdout] 970 | near_vm_call_trampoline(vmctx, trampoline, callee, values_vec) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:958:5 [INFO] [stdout] | [INFO] [stdout] 958 | / pub unsafe fn invoke_function( [INFO] [stdout] 959 | | &self, [INFO] [stdout] 960 | | vmctx: VMFunctionEnvironment, [INFO] [stdout] 961 | | trampoline: VMTrampoline, [INFO] [stdout] 962 | | callee: *const VMFunctionBody, [INFO] [stdout] 963 | | values_vec: *mut u8, [INFO] [stdout] 964 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::r#ref::InstanceRef::as_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1156:28 [INFO] [stdout] | [INFO] [stdout] 1156 | let instance_ref = instance_lock.instance.as_mut_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1149:1 [INFO] [stdout] | [INFO] [stdout] 1149 | #[tracing::instrument(target = "near_vm", level = "trace", skip_all)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the attribute macro `tracing::instrument` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1171:17 [INFO] [stdout] | [INFO] [stdout] 1171 | let f = mem::transmute::<&ImportInitializerFuncPtr, &ImportInitializerFuncPtr>(&init); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1194:5 [INFO] [stdout] | [INFO] [stdout] 1194 | slice::from_raw_parts_mut(memory.base, memory.current_length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1189:1 [INFO] [stdout] | [INFO] [stdout] 1189 | / unsafe fn get_memory_slice<'instance>( [INFO] [stdout] 1190 | | init: &DataInitializer<'_>, [INFO] [stdout] 1191 | | instance: &'instance Instance, [INFO] [stdout] 1192 | | ) -> &'instance mut [u8] { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `memory::linear_memory::LinearMemory::new_internal` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | Self::new_internal(memory, style, Some(vm_memory_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | / pub unsafe fn from_definition( [INFO] [stdout] 85 | | memory: &MemoryType, [INFO] [stdout] 86 | | style: &MemoryStyle, [INFO] [stdout] 87 | | vm_memory_location: NonNull, [INFO] [stdout] 88 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:151:30 [INFO] [stdout] | [INFO] [stdout] 151 | let md = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | / unsafe fn new_internal( [INFO] [stdout] 94 | | memory: &MemoryType, [INFO] [stdout] 95 | | style: &MemoryStyle, [INFO] [stdout] 96 | | vm_memory_location: Option>, [INFO] [stdout] 97 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:175:17 [INFO] [stdout] | [INFO] [stdout] 175 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:171:5 [INFO] [stdout] | [INFO] [stdout] 171 | unsafe fn get_vm_memory_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `table::LinearTable::new_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:208:9 [INFO] [stdout] | [INFO] [stdout] 208 | Self::new_inner(table, style, Some(vm_table_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe fn from_definition( [INFO] [stdout] 204 | | table: &TableType, [INFO] [stdout] 205 | | style: &TableStyle, [INFO] [stdout] 206 | | vm_table_location: NonNull, [INFO] [stdout] 207 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:242:34 [INFO] [stdout] | [INFO] [stdout] 242 | let td = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:212:5 [INFO] [stdout] | [INFO] [stdout] 212 | / unsafe fn new_inner( [INFO] [stdout] 213 | | table: &TableType, [INFO] [stdout] 214 | | style: &TableStyle, [INFO] [stdout] 215 | | vm_table_location: Option>, [INFO] [stdout] 216 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:265:17 [INFO] [stdout] | [INFO] [stdout] 265 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:261:5 [INFO] [stdout] | [INFO] [stdout] 261 | unsafe fn get_vm_table_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | / catch_traps(|| { [INFO] [stdout] 153 | | mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] 157 | | }) [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | / pub unsafe fn near_vm_call_trampoline( [INFO] [stdout] 147 | | callee_env: VMFunctionEnvironment, [INFO] [stdout] 148 | | trampoline: VMTrampoline, [INFO] [stdout] 149 | | callee: *const VMFunctionBody, [INFO] [stdout] 150 | | values_vec: *mut u8, [INFO] [stdout] 151 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:153:9 [INFO] [stdout] | [INFO] [stdout] 153 | / mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_register_setjmp` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:171:9 [INFO] [stdout] | [INFO] [stdout] 171 | / near_vm_register_setjmp( [INFO] [stdout] 172 | | cx.jmp_buf.as_ptr(), [INFO] [stdout] 173 | | call_closure::, [INFO] [stdout] 174 | | &mut closure as *mut F as *mut u8, [INFO] [stdout] 175 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | / pub unsafe fn catch_traps(mut closure: F) -> Result<(), Trap> [INFO] [stdout] 167 | | where [INFO] [stdout] 168 | | F: FnMut(), [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:200:5 [INFO] [stdout] | [INFO] [stdout] 200 | / catch_traps(|| { [INFO] [stdout] 201 | | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] 202 | | })?; [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / pub unsafe fn catch_traps_with_result(mut closure: F) -> Result [INFO] [stdout] 196 | | where [INFO] [stdout] 197 | | F: FnMut() -> R, [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:201:9 [INFO] [stdout] | [INFO] [stdout] 201 | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:203:8 [INFO] [stdout] | [INFO] [stdout] 203 | Ok(global_results.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:339:24 [INFO] [stdout] | [INFO] [stdout] 339 | let prev = (*raw).prev.replace(ptr::null()); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:331:9 [INFO] [stdout] | [INFO] [stdout] 331 | pub unsafe fn take() -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:354:21 [INFO] [stdout] | [INFO] [stdout] 354 | assert!((*self.0).prev.get().is_null()); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:350:9 [INFO] [stdout] | [INFO] [stdout] 350 | pub unsafe fn replace(self) -> Result<(), super::Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:355:13 [INFO] [stdout] | [INFO] [stdout] 355 | (*self.0).prev.set(prev); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:414:19 [INFO] [stdout] | [INFO] [stdout] 414 | let dst = self.base.add(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:399:5 [INFO] [stdout] | [INFO] [stdout] 399 | pub(crate) unsafe fn memory_copy(&self, dst: u32, src: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:415:19 [INFO] [stdout] | [INFO] [stdout] 415 | let src = self.base.add(src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:416:9 [INFO] [stdout] | [INFO] [stdout] 416 | ptr::copy(src, dst, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:442:19 [INFO] [stdout] | [INFO] [stdout] 442 | let dst = self.base.offset(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:431:5 [INFO] [stdout] | [INFO] [stdout] 431 | pub(crate) unsafe fn memory_fill(&self, dst: u32, val: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:443:9 [INFO] [stdout] | [INFO] [stdout] 443 | ptr::write_bytes(dst, val, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:612:14 [INFO] [stdout] | [INFO] [stdout] 612 | &mut self.storage.as_i32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:611:5 [INFO] [stdout] | [INFO] [stdout] 611 | pub unsafe fn as_i32_mut(&mut self) -> &mut i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:631:14 [INFO] [stdout] | [INFO] [stdout] 631 | &mut self.storage.as_u32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:630:5 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn as_u32_mut(&mut self) -> &mut u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:650:14 [INFO] [stdout] | [INFO] [stdout] 650 | &mut self.storage.as_i64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:649:5 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe fn as_i64_mut(&mut self) -> &mut i64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | &mut self.storage.as_u64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:668:5 [INFO] [stdout] | [INFO] [stdout] 668 | pub unsafe fn as_u64_mut(&mut self) -> &mut u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:688:14 [INFO] [stdout] | [INFO] [stdout] 688 | &mut self.storage.as_f32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:687:5 [INFO] [stdout] | [INFO] [stdout] 687 | pub unsafe fn as_f32_mut(&mut self) -> &mut f32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:707:14 [INFO] [stdout] | [INFO] [stdout] 707 | &mut self.storage.as_f64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:706:5 [INFO] [stdout] | [INFO] [stdout] 706 | pub unsafe fn as_f64_mut(&mut self) -> &mut f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:726:14 [INFO] [stdout] | [INFO] [stdout] 726 | &mut self.storage.as_funcref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:725:5 [INFO] [stdout] | [INFO] [stdout] 725 | pub unsafe fn as_funcref_mut(&mut self) -> &mut VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:738:14 [INFO] [stdout] | [INFO] [stdout] 738 | &mut self.storage.as_externref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:737:5 [INFO] [stdout] | [INFO] [stdout] 737 | pub unsafe fn as_externref_mut(&mut self) -> &mut VMExternRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:764:14 [INFO] [stdout] | [INFO] [stdout] 764 | &mut self.storage.as_u128 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn as_u128_mut(&mut self) -> &mut u128 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:780:14 [INFO] [stdout] | [INFO] [stdout] 780 | &mut self.storage.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:779:5 [INFO] [stdout] | [INFO] [stdout] 779 | pub unsafe fn as_bytes_mut(&mut self) -> &mut [u8; 16] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:10 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1075:5 [INFO] [stdout] | [INFO] [stdout] 1075 | pub unsafe fn instance(&self) -> &Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:12 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1086:9 [INFO] [stdout] | [INFO] [stdout] 1086 | self.instance().host_state() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1085:5 [INFO] [stdout] | [INFO] [stdout] 1085 | pub unsafe fn host_state(&self) -> &dyn Any { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:20 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn near_vm_memory32_grow( [INFO] [stdout] 149 | | vmctx: *mut VMContext, [INFO] [stdout] 150 | | delta: u32, [INFO] [stdout] 151 | | memory_index: u32, [INFO] [stdout] 152 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:22 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:20 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn near_vm_imported_memory32_grow( [INFO] [stdout] 166 | | vmctx: *mut VMContext, [INFO] [stdout] 167 | | delta: u32, [INFO] [stdout] 168 | | memory_index: u32, [INFO] [stdout] 169 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | / instance [INFO] [stdout] 174 | | .imported_memory_grow(memory_index, delta) [INFO] [stdout] | |__________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:20 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | pub unsafe extern "C" fn near_vm_memory32_size(vmctx: *mut VMContext, memory_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:22 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:20 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | / pub unsafe extern "C" fn near_vm_imported_memory32_size( [INFO] [stdout] 199 | | vmctx: *mut VMContext, [INFO] [stdout] 200 | | memory_index: u32, [INFO] [stdout] 201 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:22 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:205:5 [INFO] [stdout] | [INFO] [stdout] 205 | instance.imported_memory_size(memory_index).0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:24 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / pub unsafe extern "C" fn near_vm_table_copy( [INFO] [stdout] 215 | | vmctx: *mut VMContext, [INFO] [stdout] 216 | | dst_table_index: u32, [INFO] [stdout] 217 | | src_table_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 220 | | len: u32, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:26 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:24 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:241:1 [INFO] [stdout] | [INFO] [stdout] 241 | / pub unsafe extern "C" fn near_vm_table_init( [INFO] [stdout] 242 | | vmctx: *mut VMContext, [INFO] [stdout] 243 | | table_index: u32, [INFO] [stdout] 244 | | elem_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 247 | | len: u32, [INFO] [stdout] 248 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:26 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:256:9 [INFO] [stdout] | [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:24 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:266:1 [INFO] [stdout] | [INFO] [stdout] 266 | / pub unsafe extern "C" fn near_vm_table_fill( [INFO] [stdout] 267 | | vmctx: *mut VMContext, [INFO] [stdout] 268 | | table_index: u32, [INFO] [stdout] 269 | | start_idx: u32, [INFO] [stdout] 270 | | item: RawTableElement, [INFO] [stdout] 271 | | len: u32, [INFO] [stdout] 272 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:26 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:277:56 [INFO] [stdout] | [INFO] [stdout] 277 | Type::ExternRef => TableElement::ExternRef(item.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:278:52 [INFO] [stdout] | [INFO] [stdout] 278 | Type::FuncRef => TableElement::FuncRef(item.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:285:9 [INFO] [stdout] | [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:20 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | pub unsafe extern "C" fn near_vm_table_size(vmctx: *mut VMContext, table_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:22 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:20 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:308:1 [INFO] [stdout] | [INFO] [stdout] 308 | / pub unsafe extern "C" fn near_vm_imported_table_size( [INFO] [stdout] 309 | | vmctx: *mut VMContext, [INFO] [stdout] 310 | | table_index: u32, [INFO] [stdout] 311 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:22 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:315:5 [INFO] [stdout] | [INFO] [stdout] 315 | instance.imported_table_size(table_index) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:20 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:324:1 [INFO] [stdout] | [INFO] [stdout] 324 | / pub unsafe extern "C" fn near_vm_table_get( [INFO] [stdout] 325 | | vmctx: *mut VMContext, [INFO] [stdout] 326 | | table_index: u32, [INFO] [stdout] 327 | | elem_index: u32, [INFO] [stdout] 328 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:22 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:335:17 [INFO] [stdout] | [INFO] [stdout] 335 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:20 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | / pub unsafe extern "C" fn near_vm_imported_table_get( [INFO] [stdout] 346 | | vmctx: *mut VMContext, [INFO] [stdout] 347 | | table_index: u32, [INFO] [stdout] 348 | | elem_index: u32, [INFO] [stdout] 349 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:22 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:354:11 [INFO] [stdout] | [INFO] [stdout] 354 | match instance.imported_table_get(table_index, elem_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:356:17 [INFO] [stdout] | [INFO] [stdout] 356 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe extern "C" fn near_vm_table_set( [INFO] [stdout] 370 | | vmctx: *mut VMContext, [INFO] [stdout] 371 | | table_index: u32, [INFO] [stdout] 372 | | elem_index: u32, [INFO] [stdout] 373 | | value: RawTableElement, [INFO] [stdout] 374 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:22 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:379:56 [INFO] [stdout] | [INFO] [stdout] 379 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:380:52 [INFO] [stdout] | [INFO] [stdout] 380 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:386:13 [INFO] [stdout] | [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn near_vm_imported_table_set( [INFO] [stdout] 400 | | vmctx: *mut VMContext, [INFO] [stdout] 401 | | table_index: u32, [INFO] [stdout] 402 | | elem_index: u32, [INFO] [stdout] 403 | | value: RawTableElement, [INFO] [stdout] 404 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:22 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:408:52 [INFO] [stdout] | [INFO] [stdout] 408 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:409:48 [INFO] [stdout] | [INFO] [stdout] 409 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_set` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:412:18 [INFO] [stdout] | [INFO] [stdout] 412 | let result = instance.imported_table_set(table_index, elem_index, elem); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:414:9 [INFO] [stdout] | [INFO] [stdout] 414 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:20 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:424:1 [INFO] [stdout] | [INFO] [stdout] 424 | / pub unsafe extern "C" fn near_vm_table_grow( [INFO] [stdout] 425 | | vmctx: *mut VMContext, [INFO] [stdout] 426 | | init_value: RawTableElement, [INFO] [stdout] 427 | | delta: u32, [INFO] [stdout] 428 | | table_index: u32, [INFO] [stdout] 429 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:22 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:433:52 [INFO] [stdout] | [INFO] [stdout] 433 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:434:48 [INFO] [stdout] | [INFO] [stdout] 434 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:20 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:446:1 [INFO] [stdout] | [INFO] [stdout] 446 | / pub unsafe extern "C" fn near_vm_imported_table_grow( [INFO] [stdout] 447 | | vmctx: *mut VMContext, [INFO] [stdout] 448 | | init_value: RawTableElement, [INFO] [stdout] 449 | | delta: u32, [INFO] [stdout] 450 | | table_index: u32, [INFO] [stdout] 451 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:22 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:455:52 [INFO] [stdout] | [INFO] [stdout] 455 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:456:48 [INFO] [stdout] | [INFO] [stdout] 456 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | instance.imported_table_grow(table_index, delta, init_value).unwrap_or(u32::max_value()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:20 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:469:1 [INFO] [stdout] | [INFO] [stdout] 469 | pub unsafe extern "C" fn near_vm_func_ref(vmctx: *mut VMContext, function_index: u32) -> VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:22 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:20 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:507:1 [INFO] [stdout] | [INFO] [stdout] 507 | pub unsafe extern "C" fn near_vm_elem_drop(vmctx: *mut VMContext, elem_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:22 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:24 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:519:1 [INFO] [stdout] | [INFO] [stdout] 519 | / pub unsafe extern "C" fn near_vm_memory32_copy( [INFO] [stdout] 520 | | vmctx: *mut VMContext, [INFO] [stdout] 521 | | memory_index: u32, [INFO] [stdout] 522 | | dst: u32, [INFO] [stdout] 523 | | src: u32, [INFO] [stdout] 524 | | len: u32, [INFO] [stdout] 525 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:26 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:532:9 [INFO] [stdout] | [INFO] [stdout] 532 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:24 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:542:1 [INFO] [stdout] | [INFO] [stdout] 542 | / pub unsafe extern "C" fn near_vm_imported_memory32_copy( [INFO] [stdout] 543 | | vmctx: *mut VMContext, [INFO] [stdout] 544 | | memory_index: u32, [INFO] [stdout] 545 | | dst: u32, [INFO] [stdout] 546 | | src: u32, [INFO] [stdout] 547 | | len: u32, [INFO] [stdout] 548 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:26 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:555:9 [INFO] [stdout] | [INFO] [stdout] 555 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:24 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:565:1 [INFO] [stdout] | [INFO] [stdout] 565 | / pub unsafe extern "C" fn near_vm_memory32_fill( [INFO] [stdout] 566 | | vmctx: *mut VMContext, [INFO] [stdout] 567 | | memory_index: u32, [INFO] [stdout] 568 | | dst: u32, [INFO] [stdout] 569 | | val: u32, [INFO] [stdout] 570 | | len: u32, [INFO] [stdout] 571 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:26 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:578:9 [INFO] [stdout] | [INFO] [stdout] 578 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:24 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:588:1 [INFO] [stdout] | [INFO] [stdout] 588 | / pub unsafe extern "C" fn near_vm_imported_memory32_fill( [INFO] [stdout] 589 | | vmctx: *mut VMContext, [INFO] [stdout] 590 | | memory_index: u32, [INFO] [stdout] 591 | | dst: u32, [INFO] [stdout] 592 | | val: u32, [INFO] [stdout] 593 | | len: u32, [INFO] [stdout] 594 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:26 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:601:9 [INFO] [stdout] | [INFO] [stdout] 601 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:24 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / pub unsafe extern "C" fn near_vm_memory32_init( [INFO] [stdout] 612 | | vmctx: *mut VMContext, [INFO] [stdout] 613 | | memory_index: u32, [INFO] [stdout] 614 | | data_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 617 | | len: u32, [INFO] [stdout] 618 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:26 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:626:9 [INFO] [stdout] | [INFO] [stdout] 626 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:20 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:636:1 [INFO] [stdout] | [INFO] [stdout] 636 | pub unsafe extern "C" fn near_vm_data_drop(vmctx: *mut VMContext, data_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:22 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:651:5 [INFO] [stdout] | [INFO] [stdout] 651 | raise_lib_trap(trap) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:649:1 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe extern "C" fn near_vm_raise_trap(trap_code: TrapCode) -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/func_data_registry.rs:104:23 [INFO] [stdout] | [INFO] [stdout] 104 | let data = if let Some(&idx) = inner.anyfunc_to_index.get(&anyfunc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^-----^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/func_data_registry.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 104 ~ let data = match inner.anyfunc_to_index.get(&anyfunc) { Some(&idx) => { [INFO] [stdout] 105 | &inner.func_data[idx] [INFO] [stdout] 106 ~ } _ => { [INFO] [stdout] 107 | let idx = inner.func_data.len(); [INFO] [stdout] ... [INFO] [stdout] 110 | &inner.func_data[idx] [INFO] [stdout] 111 ~ }}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:230:8 [INFO] [stdout] | [INFO] [stdout] 230 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:232:5 [INFO] [stdout] | [INFO] [stdout] 232 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 230 ~ match result { Err(trap) => { [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] 232 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:255:8 [INFO] [stdout] | [INFO] [stdout] 255 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:257:5 [INFO] [stdout] | [INFO] [stdout] 257 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 255 ~ match result { Err(trap) => { [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] 257 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:284:8 [INFO] [stdout] | [INFO] [stdout] 284 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:286:5 [INFO] [stdout] | [INFO] [stdout] 286 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 284 ~ match result { Err(trap) => { [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] 286 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:377:8 [INFO] [stdout] | [INFO] [stdout] 377 | if let Ok(local_table) = instance.artifact.import_counts().local_table_index(table_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^-----------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:388:5 [INFO] [stdout] | [INFO] [stdout] 388 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 377 ~ match instance.artifact.import_counts().local_table_index(table_index) { Ok(local_table) => { [INFO] [stdout] 378 | let elem = match instance.get_local_table(local_table).ty().ty { [INFO] [stdout] ... [INFO] [stdout] 387 | } [INFO] [stdout] 388 ~ } _ => { [INFO] [stdout] 389 | panic!("near_vm_imported_table_set should have been called"); [INFO] [stdout] 390 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:385:12 [INFO] [stdout] | [INFO] [stdout] 385 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 385 ~ match result { Err(trap) => { [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] 387 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:413:8 [INFO] [stdout] | [INFO] [stdout] 413 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:415:5 [INFO] [stdout] | [INFO] [stdout] 415 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 413 ~ match result { Err(trap) => { [INFO] [stdout] 414 | raise_lib_trap(trap); [INFO] [stdout] 415 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:531:8 [INFO] [stdout] | [INFO] [stdout] 531 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:533:5 [INFO] [stdout] | [INFO] [stdout] 533 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 531 ~ match result { Err(trap) => { [INFO] [stdout] 532 | raise_lib_trap(trap); [INFO] [stdout] 533 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:554:8 [INFO] [stdout] | [INFO] [stdout] 554 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:556:5 [INFO] [stdout] | [INFO] [stdout] 556 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 554 ~ match result { Err(trap) => { [INFO] [stdout] 555 | raise_lib_trap(trap); [INFO] [stdout] 556 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:577:8 [INFO] [stdout] | [INFO] [stdout] 577 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:579:5 [INFO] [stdout] | [INFO] [stdout] 579 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 577 ~ match result { Err(trap) => { [INFO] [stdout] 578 | raise_lib_trap(trap); [INFO] [stdout] 579 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:600:8 [INFO] [stdout] | [INFO] [stdout] 600 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:602:5 [INFO] [stdout] | [INFO] [stdout] 602 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 600 ~ match result { Err(trap) => { [INFO] [stdout] 601 | raise_lib_trap(trap); [INFO] [stdout] 602 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:625:8 [INFO] [stdout] | [INFO] [stdout] 625 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:627:5 [INFO] [stdout] | [INFO] [stdout] 627 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 625 ~ match result { Err(trap) => { [INFO] [stdout] 626 | raise_lib_trap(trap); [INFO] [stdout] 627 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 193 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `near_vm_vm` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/export/mod.rs [INFO] [stderr] * src/export/vmmemory.rs [INFO] [stderr] * src/imports.rs [INFO] [stderr] * src/instance/mod.rs [INFO] [stderr] * src/lib.rs [INFO] [stderr] * src/vmcontext.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error: expected item after doc comment [INFO] [stderr] --> src/instance/mod.rs:1148:1 [INFO] [stderr] | [INFO] [stderr] 1142 | / /// Initializes the host environments. [INFO] [stderr] 1143 | | /// [INFO] [stderr] 1144 | | /// # Safety [INFO] [stderr] 1145 | | /// - This function must be called with the correct `Err` type parameter: the error type is not [INFO] [stderr] 1146 | | /// visible to code in `near_vm_vm`, so it's the caller's responsibility to ensure these [INFO] [stderr] 1147 | | /// functions are called with the correct type. [INFO] [stderr] | |_________________________________________________- other attributes here [INFO] [stderr] 1148 | /// - `instance_ptr` must point to a valid `near_vm_test_api::Instance`. [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this doc comment doesn't document anything [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/export/mod.rs:5:5 [INFO] [stderr] | [INFO] [stderr] 5 | use crate::instance::WeakOrStrongInstanceRef; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/export/vmmemory.rs:1:5 [INFO] [stderr] | [INFO] [stderr] 1 | use crate::instance::WeakOrStrongInstanceRef; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] | [INFO] [stderr] help: consider importing this unresolved item through its public re-export instead [INFO] [stderr] | [INFO] [stderr] 1 | use crate::export::WeakOrStrongInstanceRef; [INFO] [stderr] | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::ImportFunctionEnv` [INFO] [stderr] --> src/imports.rs:4:5 [INFO] [stderr] | [INFO] [stderr] 4 | use crate::instance::ImportFunctionEnv; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no `ImportFunctionEnv` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved import `crate::instance::Instance` [INFO] [stderr] --> src/vmcontext.rs:9:5 [INFO] [stderr] | [INFO] [stderr] 9 | use crate::instance::Instance; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ no `Instance` in `instance` [INFO] [stderr] [INFO] [stderr] error[E0432]: unresolved imports `crate::instance::initialize_host_envs`, `crate::instance::ImportFunctionEnv`, `crate::instance::ImportInitializerFuncPtr`, `crate::instance::InstanceAllocator`, `crate::instance::InstanceHandle`, `crate::instance::WeakOrStrongInstanceRef` [INFO] [stderr] --> src/lib.rs:41:5 [INFO] [stderr] | [INFO] [stderr] 41 | initialize_host_envs, ImportFunctionEnv, ImportInitializerFuncPtr, InstanceAllocator, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ no `InstanceAllocator` in `instance` [INFO] [stderr] | | | | [INFO] [stderr] | | | no `ImportInitializerFuncPtr` in `instance` [INFO] [stderr] | | no `ImportFunctionEnv` in `instance` [INFO] [stderr] | no `initialize_host_envs` in `instance` [INFO] [stderr] 42 | InstanceHandle, WeakOrStrongInstanceRef, [INFO] [stderr] | ^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^ no `WeakOrStrongInstanceRef` in `instance` [INFO] [stderr] | | [INFO] [stderr] | no `InstanceHandle` in `instance` [INFO] [stderr] [INFO] [stderr] error: aborting due to 6 previous errors [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0432`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 53 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:65:3 [INFO] [stdout] | [INFO] [stdout] 65 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 65 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:98:3 [INFO] [stdout] | [INFO] [stdout] 98 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 98 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:104:3 [INFO] [stdout] | [INFO] [stdout] 104 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 104 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:110:3 [INFO] [stdout] | [INFO] [stdout] 110 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 110 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:117:3 [INFO] [stdout] | [INFO] [stdout] 117 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 117 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:197:3 [INFO] [stdout] | [INFO] [stdout] 197 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 197 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:213:3 [INFO] [stdout] | [INFO] [stdout] 213 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 213 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:240:3 [INFO] [stdout] | [INFO] [stdout] 240 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 240 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:265:3 [INFO] [stdout] | [INFO] [stdout] 265 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 265 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:307:3 [INFO] [stdout] | [INFO] [stdout] 307 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 307 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:323:3 [INFO] [stdout] | [INFO] [stdout] 323 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 323 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:344:3 [INFO] [stdout] | [INFO] [stdout] 344 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 344 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:368:3 [INFO] [stdout] | [INFO] [stdout] 368 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 368 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:423:3 [INFO] [stdout] | [INFO] [stdout] 423 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 423 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:445:3 [INFO] [stdout] | [INFO] [stdout] 445 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 445 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:468:3 [INFO] [stdout] | [INFO] [stdout] 468 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 468 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:483:3 [INFO] [stdout] | [INFO] [stdout] 483 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 483 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:496:3 [INFO] [stdout] | [INFO] [stdout] 496 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 496 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:506:3 [INFO] [stdout] | [INFO] [stdout] 506 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 506 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:518:3 [INFO] [stdout] | [INFO] [stdout] 518 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 518 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:541:3 [INFO] [stdout] | [INFO] [stdout] 541 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 541 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:564:3 [INFO] [stdout] | [INFO] [stdout] 564 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 564 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:587:3 [INFO] [stdout] | [INFO] [stdout] 587 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 587 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:610:3 [INFO] [stdout] | [INFO] [stdout] 610 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 610 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:635:3 [INFO] [stdout] | [INFO] [stdout] 635 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 635 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:648:3 [INFO] [stdout] | [INFO] [stdout] 648 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 648 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:660:3 [INFO] [stdout] | [INFO] [stdout] 660 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 660 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/probestack.rs:58:9 [INFO] [stdout] | [INFO] [stdout] 58 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _________help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 59 | | pub fn __rust_probestack(); [INFO] [stdout] 60 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] = note: `--force-warn missing-unsafe-on-extern` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: extern blocks should be unsafe [INFO] [stdout] --> src/trap/traphandlers.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | extern "C" { [INFO] [stdout] | ^ [INFO] [stdout] | | [INFO] [stdout] | _help: needs `unsafe` before the extern keyword: `unsafe` [INFO] [stdout] | | [INFO] [stdout] 18 | | fn near_vm_register_setjmp( [INFO] [stdout] 19 | | jmp_buf: *mut *const u8, [INFO] [stdout] 20 | | callback: extern "C" fn(*mut u8), [INFO] [stdout] ... | [INFO] [stdout] 23 | | fn near_vm_unwind(jmp_buf: *const u8) -> !; [INFO] [stdout] 24 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123743 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `global::Global::set_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.set_unchecked(val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn set(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:117:31 [INFO] [stdout] | [INFO] [stdout] 117 | let definition = &mut *self.vm_global_definition.get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn set_unchecked(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:119:31 [INFO] [stdout] | [INFO] [stdout] 119 | Value::I32(i) => *definition.as_i32_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:120:31 [INFO] [stdout] | [INFO] [stdout] 120 | Value::I64(i) => *definition.as_i64_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:121:31 [INFO] [stdout] | [INFO] [stdout] 121 | Value::F32(f) => *definition.as_f32_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:122:31 [INFO] [stdout] | [INFO] [stdout] 122 | Value::F64(f) => *definition.as_f64_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_bytes_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:123:32 [INFO] [stdout] | [INFO] [stdout] 123 | Value::V128(x) => *definition.as_bytes_mut() = x.to_ne_bytes(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_externref_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:125:34 [INFO] [stdout] | [INFO] [stdout] 125 | let extern_ref = definition.as_externref_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:129:38 [INFO] [stdout] | [INFO] [stdout] 129 | Value::FuncRef(None) => *definition.as_u128_mut() = 0, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `near_vm_types::WasmValueType::write_value_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:17 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:34 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:129:24 [INFO] [stdout] | [INFO] [stdout] 129 | let base_ptr = ptr.add(mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:122:5 [INFO] [stdout] | [INFO] [stdout] 122 | unsafe fn memory_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:27 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:50 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:161:24 [INFO] [stdout] | [INFO] [stdout] 161 | let base_ptr = ptr.add(std::mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn table_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:27 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:50 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | ptr::drop_in_place(instance_ptr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | unsafe fn deallocate_instance(&mut self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | std::alloc::dealloc(instance_ptr as *mut u8, self.instance_layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:147:15 [INFO] [stdout] | [INFO] [stdout] 147 | (&mut *ptr).as_mut() [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:145:5 [INFO] [stdout] | [INFO] [stdout] 145 | pub(super) unsafe fn as_mut_unchecked(&mut self) -> &mut Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | (self.vmctx_ptr() as *mut u8).add(usize::try_from(offset).unwrap()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:182:5 [INFO] [stdout] | [INFO] [stdout] 182 | unsafe fn vmctx_plus_offset(&self, offset: u32) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:878:17 [INFO] [stdout] | [INFO] [stdout] 878 | *(instance.trap_catcher_ptr()) = get_trap_handler(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:830:5 [INFO] [stdout] | [INFO] [stdout] 830 | / pub unsafe fn new( [INFO] [stdout] 831 | | artifact: Arc, [INFO] [stdout] 832 | | allocator: InstanceAllocator, [INFO] [stdout] 833 | | finished_memories: BoxedSlice>, [INFO] [stdout] ... | [INFO] [stdout] 840 | | instance_config: InstanceConfig, [INFO] [stdout] 841 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:879:17 [INFO] [stdout] | [INFO] [stdout] 879 | *(instance.gas_counter_ptr()) = instance_config.gas_counter; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:880:17 [INFO] [stdout] | [INFO] [stdout] 880 | *(instance.stack_limit_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:881:17 [INFO] [stdout] | [INFO] [stdout] 881 | *(instance.stack_limit_initial_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:888:9 [INFO] [stdout] | [INFO] [stdout] 888 | / ptr::copy( [INFO] [stdout] 889 | | instance.artifact.signatures().as_ptr(), [INFO] [stdout] 890 | | instance.signature_ids_ptr() as *mut VMSharedSignatureIndex, [INFO] [stdout] 891 | | instance.artifact.signatures().len(), [INFO] [stdout] 892 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:894:9 [INFO] [stdout] | [INFO] [stdout] 894 | / ptr::copy( [INFO] [stdout] 895 | | imports.functions.values().as_slice().as_ptr(), [INFO] [stdout] 896 | | instance.imported_functions_ptr() as *mut VMFunctionImport, [INFO] [stdout] 897 | | imports.functions.len(), [INFO] [stdout] 898 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:899:9 [INFO] [stdout] | [INFO] [stdout] 899 | / ptr::copy( [INFO] [stdout] 900 | | imports.tables.values().as_slice().as_ptr(), [INFO] [stdout] 901 | | instance.imported_tables_ptr() as *mut VMTableImport, [INFO] [stdout] 902 | | imports.tables.len(), [INFO] [stdout] 903 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:904:9 [INFO] [stdout] | [INFO] [stdout] 904 | / ptr::copy( [INFO] [stdout] 905 | | imports.memories.values().as_slice().as_ptr(), [INFO] [stdout] 906 | | instance.imported_memories_ptr() as *mut VMMemoryImport, [INFO] [stdout] 907 | | imports.memories.len(), [INFO] [stdout] 908 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:909:9 [INFO] [stdout] | [INFO] [stdout] 909 | / ptr::copy( [INFO] [stdout] 910 | | imports.globals.values().as_slice().as_ptr(), [INFO] [stdout] 911 | | instance.imported_globals_ptr() as *mut VMGlobalImport, [INFO] [stdout] 912 | | imports.globals.len(), [INFO] [stdout] 913 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:917:9 [INFO] [stdout] | [INFO] [stdout] 917 | / ptr::copy( [INFO] [stdout] 918 | | vmctx_globals.values().as_slice().as_ptr(), [INFO] [stdout] 919 | | instance.globals_ptr() as *mut NonNull, [INFO] [stdout] 920 | | vmctx_globals.len(), [INFO] [stdout] 921 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:922:9 [INFO] [stdout] | [INFO] [stdout] 922 | / ptr::write( [INFO] [stdout] 923 | | instance.builtin_functions_ptr() as *mut VMBuiltinFunctionsArray, [INFO] [stdout] 924 | | VMBuiltinFunctionsArray::initialized(), [INFO] [stdout] 925 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_call_trampoline` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:970:9 [INFO] [stdout] | [INFO] [stdout] 970 | near_vm_call_trampoline(vmctx, trampoline, callee, values_vec) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:958:5 [INFO] [stdout] | [INFO] [stdout] 958 | / pub unsafe fn invoke_function( [INFO] [stdout] 959 | | &self, [INFO] [stdout] 960 | | vmctx: VMFunctionEnvironment, [INFO] [stdout] 961 | | trampoline: VMTrampoline, [INFO] [stdout] 962 | | callee: *const VMFunctionBody, [INFO] [stdout] 963 | | values_vec: *mut u8, [INFO] [stdout] 964 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::r#ref::InstanceRef::as_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1156:28 [INFO] [stdout] | [INFO] [stdout] 1156 | let instance_ref = instance_lock.instance.as_mut_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1149:1 [INFO] [stdout] | [INFO] [stdout] 1149 | #[tracing::instrument(target = "near_vm", level = "trace", skip_all)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the attribute macro `tracing::instrument` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1171:17 [INFO] [stdout] | [INFO] [stdout] 1171 | let f = mem::transmute::<&ImportInitializerFuncPtr, &ImportInitializerFuncPtr>(&init); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1194:5 [INFO] [stdout] | [INFO] [stdout] 1194 | slice::from_raw_parts_mut(memory.base, memory.current_length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1189:1 [INFO] [stdout] | [INFO] [stdout] 1189 | / unsafe fn get_memory_slice<'instance>( [INFO] [stdout] 1190 | | init: &DataInitializer<'_>, [INFO] [stdout] 1191 | | instance: &'instance Instance, [INFO] [stdout] 1192 | | ) -> &'instance mut [u8] { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `memory::linear_memory::LinearMemory::new_internal` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | Self::new_internal(memory, style, Some(vm_memory_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | / pub unsafe fn from_definition( [INFO] [stdout] 85 | | memory: &MemoryType, [INFO] [stdout] 86 | | style: &MemoryStyle, [INFO] [stdout] 87 | | vm_memory_location: NonNull, [INFO] [stdout] 88 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:151:30 [INFO] [stdout] | [INFO] [stdout] 151 | let md = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | / unsafe fn new_internal( [INFO] [stdout] 94 | | memory: &MemoryType, [INFO] [stdout] 95 | | style: &MemoryStyle, [INFO] [stdout] 96 | | vm_memory_location: Option>, [INFO] [stdout] 97 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:175:17 [INFO] [stdout] | [INFO] [stdout] 175 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:171:5 [INFO] [stdout] | [INFO] [stdout] 171 | unsafe fn get_vm_memory_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `table::LinearTable::new_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:208:9 [INFO] [stdout] | [INFO] [stdout] 208 | Self::new_inner(table, style, Some(vm_table_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe fn from_definition( [INFO] [stdout] 204 | | table: &TableType, [INFO] [stdout] 205 | | style: &TableStyle, [INFO] [stdout] 206 | | vm_table_location: NonNull, [INFO] [stdout] 207 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:242:34 [INFO] [stdout] | [INFO] [stdout] 242 | let td = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:212:5 [INFO] [stdout] | [INFO] [stdout] 212 | / unsafe fn new_inner( [INFO] [stdout] 213 | | table: &TableType, [INFO] [stdout] 214 | | style: &TableStyle, [INFO] [stdout] 215 | | vm_table_location: Option>, [INFO] [stdout] 216 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:265:17 [INFO] [stdout] | [INFO] [stdout] 265 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:261:5 [INFO] [stdout] | [INFO] [stdout] 261 | unsafe fn get_vm_table_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | / catch_traps(|| { [INFO] [stdout] 153 | | mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] 157 | | }) [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | / pub unsafe fn near_vm_call_trampoline( [INFO] [stdout] 147 | | callee_env: VMFunctionEnvironment, [INFO] [stdout] 148 | | trampoline: VMTrampoline, [INFO] [stdout] 149 | | callee: *const VMFunctionBody, [INFO] [stdout] 150 | | values_vec: *mut u8, [INFO] [stdout] 151 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:153:9 [INFO] [stdout] | [INFO] [stdout] 153 | / mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_register_setjmp` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:171:9 [INFO] [stdout] | [INFO] [stdout] 171 | / near_vm_register_setjmp( [INFO] [stdout] 172 | | cx.jmp_buf.as_ptr(), [INFO] [stdout] 173 | | call_closure::, [INFO] [stdout] 174 | | &mut closure as *mut F as *mut u8, [INFO] [stdout] 175 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | / pub unsafe fn catch_traps(mut closure: F) -> Result<(), Trap> [INFO] [stdout] 167 | | where [INFO] [stdout] 168 | | F: FnMut(), [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:200:5 [INFO] [stdout] | [INFO] [stdout] 200 | / catch_traps(|| { [INFO] [stdout] 201 | | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] 202 | | })?; [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / pub unsafe fn catch_traps_with_result(mut closure: F) -> Result [INFO] [stdout] 196 | | where [INFO] [stdout] 197 | | F: FnMut() -> R, [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:201:9 [INFO] [stdout] | [INFO] [stdout] 201 | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:203:8 [INFO] [stdout] | [INFO] [stdout] 203 | Ok(global_results.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:339:24 [INFO] [stdout] | [INFO] [stdout] 339 | let prev = (*raw).prev.replace(ptr::null()); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:331:9 [INFO] [stdout] | [INFO] [stdout] 331 | pub unsafe fn take() -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:354:21 [INFO] [stdout] | [INFO] [stdout] 354 | assert!((*self.0).prev.get().is_null()); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:350:9 [INFO] [stdout] | [INFO] [stdout] 350 | pub unsafe fn replace(self) -> Result<(), super::Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:355:13 [INFO] [stdout] | [INFO] [stdout] 355 | (*self.0).prev.set(prev); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:414:19 [INFO] [stdout] | [INFO] [stdout] 414 | let dst = self.base.add(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:399:5 [INFO] [stdout] | [INFO] [stdout] 399 | pub(crate) unsafe fn memory_copy(&self, dst: u32, src: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:415:19 [INFO] [stdout] | [INFO] [stdout] 415 | let src = self.base.add(src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:416:9 [INFO] [stdout] | [INFO] [stdout] 416 | ptr::copy(src, dst, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:442:19 [INFO] [stdout] | [INFO] [stdout] 442 | let dst = self.base.offset(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:431:5 [INFO] [stdout] | [INFO] [stdout] 431 | pub(crate) unsafe fn memory_fill(&self, dst: u32, val: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:443:9 [INFO] [stdout] | [INFO] [stdout] 443 | ptr::write_bytes(dst, val, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:612:14 [INFO] [stdout] | [INFO] [stdout] 612 | &mut self.storage.as_i32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:611:5 [INFO] [stdout] | [INFO] [stdout] 611 | pub unsafe fn as_i32_mut(&mut self) -> &mut i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:631:14 [INFO] [stdout] | [INFO] [stdout] 631 | &mut self.storage.as_u32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:630:5 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn as_u32_mut(&mut self) -> &mut u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:650:14 [INFO] [stdout] | [INFO] [stdout] 650 | &mut self.storage.as_i64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:649:5 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe fn as_i64_mut(&mut self) -> &mut i64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | &mut self.storage.as_u64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:668:5 [INFO] [stdout] | [INFO] [stdout] 668 | pub unsafe fn as_u64_mut(&mut self) -> &mut u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:688:14 [INFO] [stdout] | [INFO] [stdout] 688 | &mut self.storage.as_f32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:687:5 [INFO] [stdout] | [INFO] [stdout] 687 | pub unsafe fn as_f32_mut(&mut self) -> &mut f32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:707:14 [INFO] [stdout] | [INFO] [stdout] 707 | &mut self.storage.as_f64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:706:5 [INFO] [stdout] | [INFO] [stdout] 706 | pub unsafe fn as_f64_mut(&mut self) -> &mut f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:726:14 [INFO] [stdout] | [INFO] [stdout] 726 | &mut self.storage.as_funcref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:725:5 [INFO] [stdout] | [INFO] [stdout] 725 | pub unsafe fn as_funcref_mut(&mut self) -> &mut VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:738:14 [INFO] [stdout] | [INFO] [stdout] 738 | &mut self.storage.as_externref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:737:5 [INFO] [stdout] | [INFO] [stdout] 737 | pub unsafe fn as_externref_mut(&mut self) -> &mut VMExternRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:764:14 [INFO] [stdout] | [INFO] [stdout] 764 | &mut self.storage.as_u128 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn as_u128_mut(&mut self) -> &mut u128 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:780:14 [INFO] [stdout] | [INFO] [stdout] 780 | &mut self.storage.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:779:5 [INFO] [stdout] | [INFO] [stdout] 779 | pub unsafe fn as_bytes_mut(&mut self) -> &mut [u8; 16] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:10 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1075:5 [INFO] [stdout] | [INFO] [stdout] 1075 | pub unsafe fn instance(&self) -> &Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:12 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1086:9 [INFO] [stdout] | [INFO] [stdout] 1086 | self.instance().host_state() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1085:5 [INFO] [stdout] | [INFO] [stdout] 1085 | pub unsafe fn host_state(&self) -> &dyn Any { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:20 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn near_vm_memory32_grow( [INFO] [stdout] 149 | | vmctx: *mut VMContext, [INFO] [stdout] 150 | | delta: u32, [INFO] [stdout] 151 | | memory_index: u32, [INFO] [stdout] 152 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:22 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:20 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn near_vm_imported_memory32_grow( [INFO] [stdout] 166 | | vmctx: *mut VMContext, [INFO] [stdout] 167 | | delta: u32, [INFO] [stdout] 168 | | memory_index: u32, [INFO] [stdout] 169 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | / instance [INFO] [stdout] 174 | | .imported_memory_grow(memory_index, delta) [INFO] [stdout] | |__________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:20 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | pub unsafe extern "C" fn near_vm_memory32_size(vmctx: *mut VMContext, memory_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:22 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:20 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | / pub unsafe extern "C" fn near_vm_imported_memory32_size( [INFO] [stdout] 199 | | vmctx: *mut VMContext, [INFO] [stdout] 200 | | memory_index: u32, [INFO] [stdout] 201 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:22 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:205:5 [INFO] [stdout] | [INFO] [stdout] 205 | instance.imported_memory_size(memory_index).0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:24 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / pub unsafe extern "C" fn near_vm_table_copy( [INFO] [stdout] 215 | | vmctx: *mut VMContext, [INFO] [stdout] 216 | | dst_table_index: u32, [INFO] [stdout] 217 | | src_table_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 220 | | len: u32, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:26 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:24 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:241:1 [INFO] [stdout] | [INFO] [stdout] 241 | / pub unsafe extern "C" fn near_vm_table_init( [INFO] [stdout] 242 | | vmctx: *mut VMContext, [INFO] [stdout] 243 | | table_index: u32, [INFO] [stdout] 244 | | elem_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 247 | | len: u32, [INFO] [stdout] 248 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:26 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:256:9 [INFO] [stdout] | [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:24 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:266:1 [INFO] [stdout] | [INFO] [stdout] 266 | / pub unsafe extern "C" fn near_vm_table_fill( [INFO] [stdout] 267 | | vmctx: *mut VMContext, [INFO] [stdout] 268 | | table_index: u32, [INFO] [stdout] 269 | | start_idx: u32, [INFO] [stdout] 270 | | item: RawTableElement, [INFO] [stdout] 271 | | len: u32, [INFO] [stdout] 272 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:26 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:277:56 [INFO] [stdout] | [INFO] [stdout] 277 | Type::ExternRef => TableElement::ExternRef(item.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:278:52 [INFO] [stdout] | [INFO] [stdout] 278 | Type::FuncRef => TableElement::FuncRef(item.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:285:9 [INFO] [stdout] | [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:20 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | pub unsafe extern "C" fn near_vm_table_size(vmctx: *mut VMContext, table_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:22 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:20 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:308:1 [INFO] [stdout] | [INFO] [stdout] 308 | / pub unsafe extern "C" fn near_vm_imported_table_size( [INFO] [stdout] 309 | | vmctx: *mut VMContext, [INFO] [stdout] 310 | | table_index: u32, [INFO] [stdout] 311 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:22 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:315:5 [INFO] [stdout] | [INFO] [stdout] 315 | instance.imported_table_size(table_index) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:20 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:324:1 [INFO] [stdout] | [INFO] [stdout] 324 | / pub unsafe extern "C" fn near_vm_table_get( [INFO] [stdout] 325 | | vmctx: *mut VMContext, [INFO] [stdout] 326 | | table_index: u32, [INFO] [stdout] 327 | | elem_index: u32, [INFO] [stdout] 328 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:22 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:335:17 [INFO] [stdout] | [INFO] [stdout] 335 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:20 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | / pub unsafe extern "C" fn near_vm_imported_table_get( [INFO] [stdout] 346 | | vmctx: *mut VMContext, [INFO] [stdout] 347 | | table_index: u32, [INFO] [stdout] 348 | | elem_index: u32, [INFO] [stdout] 349 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:22 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:354:11 [INFO] [stdout] | [INFO] [stdout] 354 | match instance.imported_table_get(table_index, elem_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:356:17 [INFO] [stdout] | [INFO] [stdout] 356 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe extern "C" fn near_vm_table_set( [INFO] [stdout] 370 | | vmctx: *mut VMContext, [INFO] [stdout] 371 | | table_index: u32, [INFO] [stdout] 372 | | elem_index: u32, [INFO] [stdout] 373 | | value: RawTableElement, [INFO] [stdout] 374 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:22 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:379:56 [INFO] [stdout] | [INFO] [stdout] 379 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:380:52 [INFO] [stdout] | [INFO] [stdout] 380 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:386:13 [INFO] [stdout] | [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn near_vm_imported_table_set( [INFO] [stdout] 400 | | vmctx: *mut VMContext, [INFO] [stdout] 401 | | table_index: u32, [INFO] [stdout] 402 | | elem_index: u32, [INFO] [stdout] 403 | | value: RawTableElement, [INFO] [stdout] 404 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:22 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:408:52 [INFO] [stdout] | [INFO] [stdout] 408 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:409:48 [INFO] [stdout] | [INFO] [stdout] 409 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_set` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:412:18 [INFO] [stdout] | [INFO] [stdout] 412 | let result = instance.imported_table_set(table_index, elem_index, elem); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:414:9 [INFO] [stdout] | [INFO] [stdout] 414 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:20 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:424:1 [INFO] [stdout] | [INFO] [stdout] 424 | / pub unsafe extern "C" fn near_vm_table_grow( [INFO] [stdout] 425 | | vmctx: *mut VMContext, [INFO] [stdout] 426 | | init_value: RawTableElement, [INFO] [stdout] 427 | | delta: u32, [INFO] [stdout] 428 | | table_index: u32, [INFO] [stdout] 429 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:22 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:433:52 [INFO] [stdout] | [INFO] [stdout] 433 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:434:48 [INFO] [stdout] | [INFO] [stdout] 434 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:20 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:446:1 [INFO] [stdout] | [INFO] [stdout] 446 | / pub unsafe extern "C" fn near_vm_imported_table_grow( [INFO] [stdout] 447 | | vmctx: *mut VMContext, [INFO] [stdout] 448 | | init_value: RawTableElement, [INFO] [stdout] 449 | | delta: u32, [INFO] [stdout] 450 | | table_index: u32, [INFO] [stdout] 451 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:22 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:455:52 [INFO] [stdout] | [INFO] [stdout] 455 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:456:48 [INFO] [stdout] | [INFO] [stdout] 456 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | instance.imported_table_grow(table_index, delta, init_value).unwrap_or(u32::max_value()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:20 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:469:1 [INFO] [stdout] | [INFO] [stdout] 469 | pub unsafe extern "C" fn near_vm_func_ref(vmctx: *mut VMContext, function_index: u32) -> VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:22 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:20 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:507:1 [INFO] [stdout] | [INFO] [stdout] 507 | pub unsafe extern "C" fn near_vm_elem_drop(vmctx: *mut VMContext, elem_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:22 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:24 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:519:1 [INFO] [stdout] | [INFO] [stdout] 519 | / pub unsafe extern "C" fn near_vm_memory32_copy( [INFO] [stdout] 520 | | vmctx: *mut VMContext, [INFO] [stdout] 521 | | memory_index: u32, [INFO] [stdout] 522 | | dst: u32, [INFO] [stdout] 523 | | src: u32, [INFO] [stdout] 524 | | len: u32, [INFO] [stdout] 525 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:26 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:532:9 [INFO] [stdout] | [INFO] [stdout] 532 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:24 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:542:1 [INFO] [stdout] | [INFO] [stdout] 542 | / pub unsafe extern "C" fn near_vm_imported_memory32_copy( [INFO] [stdout] 543 | | vmctx: *mut VMContext, [INFO] [stdout] 544 | | memory_index: u32, [INFO] [stdout] 545 | | dst: u32, [INFO] [stdout] 546 | | src: u32, [INFO] [stdout] 547 | | len: u32, [INFO] [stdout] 548 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:26 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:555:9 [INFO] [stdout] | [INFO] [stdout] 555 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:24 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:565:1 [INFO] [stdout] | [INFO] [stdout] 565 | / pub unsafe extern "C" fn near_vm_memory32_fill( [INFO] [stdout] 566 | | vmctx: *mut VMContext, [INFO] [stdout] 567 | | memory_index: u32, [INFO] [stdout] 568 | | dst: u32, [INFO] [stdout] 569 | | val: u32, [INFO] [stdout] 570 | | len: u32, [INFO] [stdout] 571 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:26 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:578:9 [INFO] [stdout] | [INFO] [stdout] 578 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:24 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:588:1 [INFO] [stdout] | [INFO] [stdout] 588 | / pub unsafe extern "C" fn near_vm_imported_memory32_fill( [INFO] [stdout] 589 | | vmctx: *mut VMContext, [INFO] [stdout] 590 | | memory_index: u32, [INFO] [stdout] 591 | | dst: u32, [INFO] [stdout] 592 | | val: u32, [INFO] [stdout] 593 | | len: u32, [INFO] [stdout] 594 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:26 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:601:9 [INFO] [stdout] | [INFO] [stdout] 601 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:24 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / pub unsafe extern "C" fn near_vm_memory32_init( [INFO] [stdout] 612 | | vmctx: *mut VMContext, [INFO] [stdout] 613 | | memory_index: u32, [INFO] [stdout] 614 | | data_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 617 | | len: u32, [INFO] [stdout] 618 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:26 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:626:9 [INFO] [stdout] | [INFO] [stdout] 626 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 9.69s [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:20 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:636:1 [INFO] [stdout] | [INFO] [stdout] 636 | pub unsafe extern "C" fn near_vm_data_drop(vmctx: *mut VMContext, data_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:22 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:651:5 [INFO] [stdout] | [INFO] [stdout] 651 | raise_lib_trap(trap) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:649:1 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe extern "C" fn near_vm_raise_trap(trap_code: TrapCode) -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/func_data_registry.rs:104:23 [INFO] [stdout] | [INFO] [stdout] 104 | let data = if let Some(&idx) = inner.anyfunc_to_index.get(&anyfunc) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^-----^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/func_data_registry.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 104 ~ let data = match inner.anyfunc_to_index.get(&anyfunc) { Some(&idx) => { [INFO] [stdout] 105 | &inner.func_data[idx] [INFO] [stdout] 106 ~ } _ => { [INFO] [stdout] 107 | let idx = inner.func_data.len(); [INFO] [stdout] ... [INFO] [stdout] 110 | &inner.func_data[idx] [INFO] [stdout] 111 ~ }}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:230:8 [INFO] [stdout] | [INFO] [stdout] 230 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:232:5 [INFO] [stdout] | [INFO] [stdout] 232 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 230 ~ match result { Err(trap) => { [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] 232 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:255:8 [INFO] [stdout] | [INFO] [stdout] 255 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:257:5 [INFO] [stdout] | [INFO] [stdout] 257 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 255 ~ match result { Err(trap) => { [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] 257 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:284:8 [INFO] [stdout] | [INFO] [stdout] 284 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:286:5 [INFO] [stdout] | [INFO] [stdout] 286 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 284 ~ match result { Err(trap) => { [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] 286 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:377:8 [INFO] [stdout] | [INFO] [stdout] 377 | if let Ok(local_table) = instance.artifact.import_counts().local_table_index(table_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^-----------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:388:5 [INFO] [stdout] | [INFO] [stdout] 388 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 377 ~ match instance.artifact.import_counts().local_table_index(table_index) { Ok(local_table) => { [INFO] [stdout] 378 | let elem = match instance.get_local_table(local_table).ty().ty { [INFO] [stdout] ... [INFO] [stdout] 387 | } [INFO] [stdout] 388 ~ } _ => { [INFO] [stdout] 389 | panic!("near_vm_imported_table_set should have been called"); [INFO] [stdout] 390 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:385:12 [INFO] [stdout] | [INFO] [stdout] 385 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:387:9 [INFO] [stdout] | [INFO] [stdout] 387 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 385 ~ match result { Err(trap) => { [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] 387 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:413:8 [INFO] [stdout] | [INFO] [stdout] 413 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:415:5 [INFO] [stdout] | [INFO] [stdout] 415 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 413 ~ match result { Err(trap) => { [INFO] [stdout] 414 | raise_lib_trap(trap); [INFO] [stdout] 415 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:531:8 [INFO] [stdout] | [INFO] [stdout] 531 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:533:5 [INFO] [stdout] | [INFO] [stdout] 533 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 531 ~ match result { Err(trap) => { [INFO] [stdout] 532 | raise_lib_trap(trap); [INFO] [stdout] 533 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:554:8 [INFO] [stdout] | [INFO] [stdout] 554 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:556:5 [INFO] [stdout] | [INFO] [stdout] 556 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 554 ~ match result { Err(trap) => { [INFO] [stdout] 555 | raise_lib_trap(trap); [INFO] [stdout] 556 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:577:8 [INFO] [stdout] | [INFO] [stdout] 577 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:579:5 [INFO] [stdout] | [INFO] [stdout] 579 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 577 ~ match result { Err(trap) => { [INFO] [stdout] 578 | raise_lib_trap(trap); [INFO] [stdout] 579 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:600:8 [INFO] [stdout] | [INFO] [stdout] 600 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:602:5 [INFO] [stdout] | [INFO] [stdout] 602 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 600 ~ match result { Err(trap) => { [INFO] [stdout] 601 | raise_lib_trap(trap); [INFO] [stdout] 602 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/libcalls.rs:625:8 [INFO] [stdout] | [INFO] [stdout] 625 | if let Err(trap) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/libcalls.rs:627:5 [INFO] [stdout] | [INFO] [stdout] 627 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 625 ~ match result { Err(trap) => { [INFO] [stdout] 626 | raise_lib_trap(trap); [INFO] [stdout] 627 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stdout] warning: 193 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Compiling near-vm-vm v0.26.0 (/tmp/fixit) [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/probestack.rs:58:9 [INFO] [stdout] | [INFO] [stdout] 58 | / extern "C" { [INFO] [stdout] 59 | | pub fn __rust_probestack(); [INFO] [stdout] 60 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/trap/traphandlers.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | / extern "C" { [INFO] [stdout] 18 | | fn near_vm_register_setjmp( [INFO] [stdout] 19 | | jmp_buf: *mut *const u8, [INFO] [stdout] 20 | | callback: extern "C" fn(*mut u8), [INFO] [stdout] ... | [INFO] [stdout] 23 | | fn near_vm_unwind(jmp_buf: *const u8) -> !; [INFO] [stdout] 24 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/probestack.rs:58:9 [INFO] [stdout] | [INFO] [stdout] 58 | / extern "C" { [INFO] [stdout] 59 | | pub fn __rust_probestack(); [INFO] [stdout] 60 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 53 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: extern blocks must be unsafe [INFO] [stdout] --> src/trap/traphandlers.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | / extern "C" { [INFO] [stdout] 18 | | fn near_vm_register_setjmp( [INFO] [stdout] 19 | | jmp_buf: *mut *const u8, [INFO] [stdout] 20 | | callback: extern "C" fn(*mut u8), [INFO] [stdout] ... | [INFO] [stdout] 23 | | fn near_vm_unwind(jmp_buf: *const u8) -> !; [INFO] [stdout] 24 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:65:3 [INFO] [stdout] | [INFO] [stdout] 65 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 65 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 53 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:59:3 [INFO] [stdout] | [INFO] [stdout] 59 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 59 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:98:3 [INFO] [stdout] | [INFO] [stdout] 98 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 98 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:65:3 [INFO] [stdout] | [INFO] [stdout] 65 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 65 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:104:3 [INFO] [stdout] | [INFO] [stdout] 104 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 104 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:110:3 [INFO] [stdout] | [INFO] [stdout] 110 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 110 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:98:3 [INFO] [stdout] | [INFO] [stdout] 98 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 98 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:117:3 [INFO] [stdout] | [INFO] [stdout] 117 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 117 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:104:3 [INFO] [stdout] | [INFO] [stdout] 104 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 104 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:110:3 [INFO] [stdout] | [INFO] [stdout] 110 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 110 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:117:3 [INFO] [stdout] | [INFO] [stdout] 117 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 117 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:147:3 [INFO] [stdout] | [INFO] [stdout] 147 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 147 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:197:3 [INFO] [stdout] | [INFO] [stdout] 197 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 197 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:213:3 [INFO] [stdout] | [INFO] [stdout] 213 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 213 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:184:3 [INFO] [stdout] | [INFO] [stdout] 184 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 184 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:240:3 [INFO] [stdout] | [INFO] [stdout] 240 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 240 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:197:3 [INFO] [stdout] | [INFO] [stdout] 197 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 197 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:213:3 [INFO] [stdout] | [INFO] [stdout] 213 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 213 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:240:3 [INFO] [stdout] | [INFO] [stdout] 240 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 240 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:265:3 [INFO] [stdout] | [INFO] [stdout] 265 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 265 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:265:3 [INFO] [stdout] | [INFO] [stdout] 265 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 265 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:307:3 [INFO] [stdout] | [INFO] [stdout] 307 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 307 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:323:3 [INFO] [stdout] | [INFO] [stdout] 323 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 323 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:344:3 [INFO] [stdout] | [INFO] [stdout] 344 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 344 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:294:3 [INFO] [stdout] | [INFO] [stdout] 294 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 294 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:307:3 [INFO] [stdout] | [INFO] [stdout] 307 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 307 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:323:3 [INFO] [stdout] | [INFO] [stdout] 323 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 323 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:344:3 [INFO] [stdout] | [INFO] [stdout] 344 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 344 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:368:3 [INFO] [stdout] | [INFO] [stdout] 368 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 368 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:423:3 [INFO] [stdout] | [INFO] [stdout] 423 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 423 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:445:3 [INFO] [stdout] | [INFO] [stdout] 445 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 445 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:468:3 [INFO] [stdout] | [INFO] [stdout] 468 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 468 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:483:3 [INFO] [stdout] | [INFO] [stdout] 483 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 483 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:496:3 [INFO] [stdout] | [INFO] [stdout] 496 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 496 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:506:3 [INFO] [stdout] | [INFO] [stdout] 506 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 506 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:518:3 [INFO] [stdout] | [INFO] [stdout] 518 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 518 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:541:3 [INFO] [stdout] | [INFO] [stdout] 541 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 541 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:564:3 [INFO] [stdout] | [INFO] [stdout] 564 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 564 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:368:3 [INFO] [stdout] | [INFO] [stdout] 368 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 368 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:398:3 [INFO] [stdout] | [INFO] [stdout] 398 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 398 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:423:3 [INFO] [stdout] | [INFO] [stdout] 423 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 423 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:445:3 [INFO] [stdout] | [INFO] [stdout] 445 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 445 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:468:3 [INFO] [stdout] | [INFO] [stdout] 468 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 468 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:483:3 [INFO] [stdout] | [INFO] [stdout] 483 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 483 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:496:3 [INFO] [stdout] | [INFO] [stdout] 496 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 496 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:506:3 [INFO] [stdout] | [INFO] [stdout] 506 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 506 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:518:3 [INFO] [stdout] | [INFO] [stdout] 518 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 518 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:541:3 [INFO] [stdout] | [INFO] [stdout] 541 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 541 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:564:3 [INFO] [stdout] | [INFO] [stdout] 564 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 564 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:587:3 [INFO] [stdout] | [INFO] [stdout] 587 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 587 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:610:3 [INFO] [stdout] | [INFO] [stdout] 610 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 610 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:635:3 [INFO] [stdout] | [INFO] [stdout] 635 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 635 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:648:3 [INFO] [stdout] | [INFO] [stdout] 648 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 648 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:660:3 [INFO] [stdout] | [INFO] [stdout] 660 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 660 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:587:3 [INFO] [stdout] | [INFO] [stdout] 587 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 587 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:610:3 [INFO] [stdout] | [INFO] [stdout] 610 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 610 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:635:3 [INFO] [stdout] | [INFO] [stdout] 635 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 635 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:648:3 [INFO] [stdout] | [INFO] [stdout] 648 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 648 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/libcalls.rs:660:3 [INFO] [stdout] | [INFO] [stdout] 660 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 660 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `global::Global::set_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.set_unchecked(val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn set(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:117:31 [INFO] [stdout] | [INFO] [stdout] 117 | let definition = &mut *self.vm_global_definition.get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn set_unchecked(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:119:31 [INFO] [stdout] | [INFO] [stdout] 119 | Value::I32(i) => *definition.as_i32_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:120:31 [INFO] [stdout] | [INFO] [stdout] 120 | Value::I64(i) => *definition.as_i64_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:121:31 [INFO] [stdout] | [INFO] [stdout] 121 | Value::F32(f) => *definition.as_f32_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:122:31 [INFO] [stdout] | [INFO] [stdout] 122 | Value::F64(f) => *definition.as_f64_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_bytes_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:123:32 [INFO] [stdout] | [INFO] [stdout] 123 | Value::V128(x) => *definition.as_bytes_mut() = x.to_ne_bytes(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_externref_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:125:34 [INFO] [stdout] | [INFO] [stdout] 125 | let extern_ref = definition.as_externref_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:129:38 [INFO] [stdout] | [INFO] [stdout] 129 | Value::FuncRef(None) => *definition.as_u128_mut() = 0, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `near_vm_types::WasmValueType::write_value_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:17 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:34 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:129:24 [INFO] [stdout] | [INFO] [stdout] 129 | let base_ptr = ptr.add(mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:122:5 [INFO] [stdout] | [INFO] [stdout] 122 | unsafe fn memory_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:27 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:50 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:161:24 [INFO] [stdout] | [INFO] [stdout] 161 | let base_ptr = ptr.add(std::mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn table_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:27 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:50 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | ptr::drop_in_place(instance_ptr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | unsafe fn deallocate_instance(&mut self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | std::alloc::dealloc(instance_ptr as *mut u8, self.instance_layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:147:15 [INFO] [stdout] | [INFO] [stdout] 147 | (&mut *ptr).as_mut() [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:145:5 [INFO] [stdout] | [INFO] [stdout] 145 | pub(super) unsafe fn as_mut_unchecked(&mut self) -> &mut Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | (self.vmctx_ptr() as *mut u8).add(usize::try_from(offset).unwrap()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:182:5 [INFO] [stdout] | [INFO] [stdout] 182 | unsafe fn vmctx_plus_offset(&self, offset: u32) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `global::Global::set_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | self.set_unchecked(val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:98:5 [INFO] [stdout] | [INFO] [stdout] 98 | pub unsafe fn set(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:117:31 [INFO] [stdout] | [INFO] [stdout] 117 | let definition = &mut *self.vm_global_definition.get(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/global.rs:115:5 [INFO] [stdout] | [INFO] [stdout] 115 | pub unsafe fn set_unchecked(&self, val: Value) -> Result<(), GlobalError> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:119:31 [INFO] [stdout] | [INFO] [stdout] 119 | Value::I32(i) => *definition.as_i32_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_i64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:120:31 [INFO] [stdout] | [INFO] [stdout] 120 | Value::I64(i) => *definition.as_i64_mut() = i, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f32_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:121:31 [INFO] [stdout] | [INFO] [stdout] 121 | Value::F32(f) => *definition.as_f32_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_f64_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:122:31 [INFO] [stdout] | [INFO] [stdout] 122 | Value::F64(f) => *definition.as_f64_mut() = f, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_bytes_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:123:32 [INFO] [stdout] | [INFO] [stdout] 123 | Value::V128(x) => *definition.as_bytes_mut() = x.to_ne_bytes(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_externref_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:125:34 [INFO] [stdout] | [INFO] [stdout] 125 | let extern_ref = definition.as_externref_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:129:38 [INFO] [stdout] | [INFO] [stdout] 129 | Value::FuncRef(None) => *definition.as_u128_mut() = 0, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `near_vm_types::WasmValueType::write_value_to` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:17 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMGlobalDefinition::as_u128_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/global.rs:131:34 [INFO] [stdout] | [INFO] [stdout] 131 | r.write_value_to(definition.as_u128_mut() as *mut u128 as *mut i128) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:129:24 [INFO] [stdout] | [INFO] [stdout] 129 | let base_ptr = ptr.add(mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:122:5 [INFO] [stdout] | [INFO] [stdout] 122 | unsafe fn memory_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:27 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:135:50 [INFO] [stdout] | [INFO] [stdout] 135 | let new_ptr = NonNull::new_unchecked(base_ptr.add(mem_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:878:17 [INFO] [stdout] | [INFO] [stdout] 878 | *(instance.trap_catcher_ptr()) = get_trap_handler(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:830:5 [INFO] [stdout] | [INFO] [stdout] 830 | / pub unsafe fn new( [INFO] [stdout] 831 | | artifact: Arc, [INFO] [stdout] 832 | | allocator: InstanceAllocator, [INFO] [stdout] 833 | | finished_memories: BoxedSlice>, [INFO] [stdout] ... | [INFO] [stdout] 840 | | instance_config: InstanceConfig, [INFO] [stdout] 841 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:879:17 [INFO] [stdout] | [INFO] [stdout] 879 | *(instance.gas_counter_ptr()) = instance_config.gas_counter; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:161:24 [INFO] [stdout] | [INFO] [stdout] 161 | let base_ptr = ptr.add(std::mem::size_of::()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/allocator.rs:154:5 [INFO] [stdout] | [INFO] [stdout] 154 | unsafe fn table_definition_locations(&self) -> Vec> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:880:17 [INFO] [stdout] | [INFO] [stdout] 880 | *(instance.stack_limit_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:27 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:881:17 [INFO] [stdout] | [INFO] [stdout] 881 | *(instance.stack_limit_initial_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/allocator.rs:167:50 [INFO] [stdout] | [INFO] [stdout] 167 | let new_ptr = NonNull::new_unchecked(base_ptr.add(table_offset)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:888:9 [INFO] [stdout] | [INFO] [stdout] 888 | / ptr::copy( [INFO] [stdout] 889 | | instance.artifact.signatures().as_ptr(), [INFO] [stdout] 890 | | instance.signature_ids_ptr() as *mut VMSharedSignatureIndex, [INFO] [stdout] 891 | | instance.artifact.signatures().len(), [INFO] [stdout] 892 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:894:9 [INFO] [stdout] | [INFO] [stdout] 894 | / ptr::copy( [INFO] [stdout] 895 | | imports.functions.values().as_slice().as_ptr(), [INFO] [stdout] 896 | | instance.imported_functions_ptr() as *mut VMFunctionImport, [INFO] [stdout] 897 | | imports.functions.len(), [INFO] [stdout] 898 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:899:9 [INFO] [stdout] | [INFO] [stdout] 899 | / ptr::copy( [INFO] [stdout] 900 | | imports.tables.values().as_slice().as_ptr(), [INFO] [stdout] 901 | | instance.imported_tables_ptr() as *mut VMTableImport, [INFO] [stdout] 902 | | imports.tables.len(), [INFO] [stdout] 903 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:904:9 [INFO] [stdout] | [INFO] [stdout] 904 | / ptr::copy( [INFO] [stdout] 905 | | imports.memories.values().as_slice().as_ptr(), [INFO] [stdout] 906 | | instance.imported_memories_ptr() as *mut VMMemoryImport, [INFO] [stdout] 907 | | imports.memories.len(), [INFO] [stdout] 908 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:909:9 [INFO] [stdout] | [INFO] [stdout] 909 | / ptr::copy( [INFO] [stdout] 910 | | imports.globals.values().as_slice().as_ptr(), [INFO] [stdout] 911 | | instance.imported_globals_ptr() as *mut VMGlobalImport, [INFO] [stdout] 912 | | imports.globals.len(), [INFO] [stdout] 913 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::drop_in_place` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | ptr::drop_in_place(instance_ptr); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:42:5 [INFO] [stdout] | [INFO] [stdout] 42 | unsafe fn deallocate_instance(&mut self) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | std::alloc::dealloc(instance_ptr as *mut u8, self.instance_layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:917:9 [INFO] [stdout] | [INFO] [stdout] 917 | / ptr::copy( [INFO] [stdout] 918 | | vmctx_globals.values().as_slice().as_ptr(), [INFO] [stdout] 919 | | instance.globals_ptr() as *mut NonNull, [INFO] [stdout] 920 | | vmctx_globals.len(), [INFO] [stdout] 921 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:922:9 [INFO] [stdout] | [INFO] [stdout] 922 | / ptr::write( [INFO] [stdout] 923 | | instance.builtin_functions_ptr() as *mut VMBuiltinFunctionsArray, [INFO] [stdout] 924 | | VMBuiltinFunctionsArray::initialized(), [INFO] [stdout] 925 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/ref.rs:147:15 [INFO] [stdout] | [INFO] [stdout] 147 | (&mut *ptr).as_mut() [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/ref.rs:145:5 [INFO] [stdout] | [INFO] [stdout] 145 | pub(super) unsafe fn as_mut_unchecked(&mut self) -> &mut Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_call_trampoline` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:970:9 [INFO] [stdout] | [INFO] [stdout] 970 | near_vm_call_trampoline(vmctx, trampoline, callee, values_vec) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:958:5 [INFO] [stdout] | [INFO] [stdout] 958 | / pub unsafe fn invoke_function( [INFO] [stdout] 959 | | &self, [INFO] [stdout] 960 | | vmctx: VMFunctionEnvironment, [INFO] [stdout] 961 | | trampoline: VMTrampoline, [INFO] [stdout] 962 | | callee: *const VMFunctionBody, [INFO] [stdout] 963 | | values_vec: *mut u8, [INFO] [stdout] 964 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:183:9 [INFO] [stdout] | [INFO] [stdout] 183 | (self.vmctx_ptr() as *mut u8).add(usize::try_from(offset).unwrap()).cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:182:5 [INFO] [stdout] | [INFO] [stdout] 182 | unsafe fn vmctx_plus_offset(&self, offset: u32) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::r#ref::InstanceRef::as_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1156:28 [INFO] [stdout] | [INFO] [stdout] 1156 | let instance_ref = instance_lock.instance.as_mut_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1149:1 [INFO] [stdout] | [INFO] [stdout] 1149 | #[tracing::instrument(target = "near_vm", level = "trace", skip_all)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the attribute macro `tracing::instrument` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1171:17 [INFO] [stdout] | [INFO] [stdout] 1171 | let f = mem::transmute::<&ImportInitializerFuncPtr, &ImportInitializerFuncPtr>(&init); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1194:5 [INFO] [stdout] | [INFO] [stdout] 1194 | slice::from_raw_parts_mut(memory.base, memory.current_length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1189:1 [INFO] [stdout] | [INFO] [stdout] 1189 | / unsafe fn get_memory_slice<'instance>( [INFO] [stdout] 1190 | | init: &DataInitializer<'_>, [INFO] [stdout] 1191 | | instance: &'instance Instance, [INFO] [stdout] 1192 | | ) -> &'instance mut [u8] { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:878:17 [INFO] [stdout] | [INFO] [stdout] 878 | *(instance.trap_catcher_ptr()) = get_trap_handler(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:830:5 [INFO] [stdout] | [INFO] [stdout] 830 | / pub unsafe fn new( [INFO] [stdout] 831 | | artifact: Arc, [INFO] [stdout] 832 | | allocator: InstanceAllocator, [INFO] [stdout] 833 | | finished_memories: BoxedSlice>, [INFO] [stdout] ... | [INFO] [stdout] 840 | | instance_config: InstanceConfig, [INFO] [stdout] 841 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:879:17 [INFO] [stdout] | [INFO] [stdout] 879 | *(instance.gas_counter_ptr()) = instance_config.gas_counter; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:880:17 [INFO] [stdout] | [INFO] [stdout] 880 | *(instance.stack_limit_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:881:17 [INFO] [stdout] | [INFO] [stdout] 881 | *(instance.stack_limit_initial_ptr()) = instance_config.stack_limit; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:888:9 [INFO] [stdout] | [INFO] [stdout] 888 | / ptr::copy( [INFO] [stdout] 889 | | instance.artifact.signatures().as_ptr(), [INFO] [stdout] 890 | | instance.signature_ids_ptr() as *mut VMSharedSignatureIndex, [INFO] [stdout] 891 | | instance.artifact.signatures().len(), [INFO] [stdout] 892 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:894:9 [INFO] [stdout] | [INFO] [stdout] 894 | / ptr::copy( [INFO] [stdout] 895 | | imports.functions.values().as_slice().as_ptr(), [INFO] [stdout] 896 | | instance.imported_functions_ptr() as *mut VMFunctionImport, [INFO] [stdout] 897 | | imports.functions.len(), [INFO] [stdout] 898 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:899:9 [INFO] [stdout] | [INFO] [stdout] 899 | / ptr::copy( [INFO] [stdout] 900 | | imports.tables.values().as_slice().as_ptr(), [INFO] [stdout] 901 | | instance.imported_tables_ptr() as *mut VMTableImport, [INFO] [stdout] 902 | | imports.tables.len(), [INFO] [stdout] 903 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:904:9 [INFO] [stdout] | [INFO] [stdout] 904 | / ptr::copy( [INFO] [stdout] 905 | | imports.memories.values().as_slice().as_ptr(), [INFO] [stdout] 906 | | instance.imported_memories_ptr() as *mut VMMemoryImport, [INFO] [stdout] 907 | | imports.memories.len(), [INFO] [stdout] 908 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:909:9 [INFO] [stdout] | [INFO] [stdout] 909 | / ptr::copy( [INFO] [stdout] 910 | | imports.globals.values().as_slice().as_ptr(), [INFO] [stdout] 911 | | instance.imported_globals_ptr() as *mut VMGlobalImport, [INFO] [stdout] 912 | | imports.globals.len(), [INFO] [stdout] 913 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `memory::linear_memory::LinearMemory::new_internal` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | Self::new_internal(memory, style, Some(vm_memory_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | / pub unsafe fn from_definition( [INFO] [stdout] 85 | | memory: &MemoryType, [INFO] [stdout] 86 | | style: &MemoryStyle, [INFO] [stdout] 87 | | vm_memory_location: NonNull, [INFO] [stdout] 88 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:917:9 [INFO] [stdout] | [INFO] [stdout] 917 | / ptr::copy( [INFO] [stdout] 918 | | vmctx_globals.values().as_slice().as_ptr(), [INFO] [stdout] 919 | | instance.globals_ptr() as *mut NonNull, [INFO] [stdout] 920 | | vmctx_globals.len(), [INFO] [stdout] 921 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:922:9 [INFO] [stdout] | [INFO] [stdout] 922 | / ptr::write( [INFO] [stdout] 923 | | instance.builtin_functions_ptr() as *mut VMBuiltinFunctionsArray, [INFO] [stdout] 924 | | VMBuiltinFunctionsArray::initialized(), [INFO] [stdout] 925 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:151:30 [INFO] [stdout] | [INFO] [stdout] 151 | let md = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | / unsafe fn new_internal( [INFO] [stdout] 94 | | memory: &MemoryType, [INFO] [stdout] 95 | | style: &MemoryStyle, [INFO] [stdout] 96 | | vm_memory_location: Option>, [INFO] [stdout] 97 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:175:17 [INFO] [stdout] | [INFO] [stdout] 175 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:171:5 [INFO] [stdout] | [INFO] [stdout] 171 | unsafe fn get_vm_memory_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_call_trampoline` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:970:9 [INFO] [stdout] | [INFO] [stdout] 970 | near_vm_call_trampoline(vmctx, trampoline, callee, values_vec) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:958:5 [INFO] [stdout] | [INFO] [stdout] 958 | / pub unsafe fn invoke_function( [INFO] [stdout] 959 | | &self, [INFO] [stdout] 960 | | vmctx: VMFunctionEnvironment, [INFO] [stdout] 961 | | trampoline: VMTrampoline, [INFO] [stdout] 962 | | callee: *const VMFunctionBody, [INFO] [stdout] 963 | | values_vec: *mut u8, [INFO] [stdout] 964 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::r#ref::InstanceRef::as_mut_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1156:28 [INFO] [stdout] | [INFO] [stdout] 1156 | let instance_ref = instance_lock.instance.as_mut_unchecked(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1149:1 [INFO] [stdout] | [INFO] [stdout] 1149 | #[tracing::instrument(target = "near_vm", level = "trace", skip_all)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: this warning originates in the attribute macro `tracing::instrument` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1171:17 [INFO] [stdout] | [INFO] [stdout] 1171 | let f = mem::transmute::<&ImportInitializerFuncPtr, &ImportInitializerFuncPtr>(&init); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/instance/mod.rs:1194:5 [INFO] [stdout] | [INFO] [stdout] 1194 | slice::from_raw_parts_mut(memory.base, memory.current_length) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/instance/mod.rs:1189:1 [INFO] [stdout] | [INFO] [stdout] 1189 | / unsafe fn get_memory_slice<'instance>( [INFO] [stdout] 1190 | | init: &DataInitializer<'_>, [INFO] [stdout] 1191 | | instance: &'instance Instance, [INFO] [stdout] 1192 | | ) -> &'instance mut [u8] { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `memory::linear_memory::LinearMemory::new_internal` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | Self::new_internal(memory, style, Some(vm_memory_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:84:5 [INFO] [stdout] | [INFO] [stdout] 84 | / pub unsafe fn from_definition( [INFO] [stdout] 85 | | memory: &MemoryType, [INFO] [stdout] 86 | | style: &MemoryStyle, [INFO] [stdout] 87 | | vm_memory_location: NonNull, [INFO] [stdout] 88 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:151:30 [INFO] [stdout] | [INFO] [stdout] 151 | let md = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:93:5 [INFO] [stdout] | [INFO] [stdout] 93 | / unsafe fn new_internal( [INFO] [stdout] 94 | | memory: &MemoryType, [INFO] [stdout] 95 | | style: &MemoryStyle, [INFO] [stdout] 96 | | vm_memory_location: Option>, [INFO] [stdout] 97 | | ) -> Result { [INFO] [stdout] | |__________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/memory/linear_memory.rs:175:17 [INFO] [stdout] | [INFO] [stdout] 175 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/memory/linear_memory.rs:171:5 [INFO] [stdout] | [INFO] [stdout] 171 | unsafe fn get_vm_memory_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `table::LinearTable::new_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:208:9 [INFO] [stdout] | [INFO] [stdout] 208 | Self::new_inner(table, style, Some(vm_table_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe fn from_definition( [INFO] [stdout] 204 | | table: &TableType, [INFO] [stdout] 205 | | style: &TableStyle, [INFO] [stdout] 206 | | vm_table_location: NonNull, [INFO] [stdout] 207 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:242:34 [INFO] [stdout] | [INFO] [stdout] 242 | let td = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:212:5 [INFO] [stdout] | [INFO] [stdout] 212 | / unsafe fn new_inner( [INFO] [stdout] 213 | | table: &TableType, [INFO] [stdout] 214 | | style: &TableStyle, [INFO] [stdout] 215 | | vm_table_location: Option>, [INFO] [stdout] 216 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:265:17 [INFO] [stdout] | [INFO] [stdout] 265 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:261:5 [INFO] [stdout] | [INFO] [stdout] 261 | unsafe fn get_vm_table_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | / catch_traps(|| { [INFO] [stdout] 153 | | mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] 157 | | }) [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | / pub unsafe fn near_vm_call_trampoline( [INFO] [stdout] 147 | | callee_env: VMFunctionEnvironment, [INFO] [stdout] 148 | | trampoline: VMTrampoline, [INFO] [stdout] 149 | | callee: *const VMFunctionBody, [INFO] [stdout] 150 | | values_vec: *mut u8, [INFO] [stdout] 151 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:153:9 [INFO] [stdout] | [INFO] [stdout] 153 | / mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_register_setjmp` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:171:9 [INFO] [stdout] | [INFO] [stdout] 171 | / near_vm_register_setjmp( [INFO] [stdout] 172 | | cx.jmp_buf.as_ptr(), [INFO] [stdout] 173 | | call_closure::, [INFO] [stdout] 174 | | &mut closure as *mut F as *mut u8, [INFO] [stdout] 175 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | / pub unsafe fn catch_traps(mut closure: F) -> Result<(), Trap> [INFO] [stdout] 167 | | where [INFO] [stdout] 168 | | F: FnMut(), [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:200:5 [INFO] [stdout] | [INFO] [stdout] 200 | / catch_traps(|| { [INFO] [stdout] 201 | | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] 202 | | })?; [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / pub unsafe fn catch_traps_with_result(mut closure: F) -> Result [INFO] [stdout] 196 | | where [INFO] [stdout] 197 | | F: FnMut() -> R, [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:201:9 [INFO] [stdout] | [INFO] [stdout] 201 | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:203:8 [INFO] [stdout] | [INFO] [stdout] 203 | Ok(global_results.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:339:24 [INFO] [stdout] | [INFO] [stdout] 339 | let prev = (*raw).prev.replace(ptr::null()); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:331:9 [INFO] [stdout] | [INFO] [stdout] 331 | pub unsafe fn take() -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:354:21 [INFO] [stdout] | [INFO] [stdout] 354 | assert!((*self.0).prev.get().is_null()); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:350:9 [INFO] [stdout] | [INFO] [stdout] 350 | pub unsafe fn replace(self) -> Result<(), super::Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:355:13 [INFO] [stdout] | [INFO] [stdout] 355 | (*self.0).prev.set(prev); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `table::LinearTable::new_inner` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:208:9 [INFO] [stdout] | [INFO] [stdout] 208 | Self::new_inner(table, style, Some(vm_table_location)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:203:5 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe fn from_definition( [INFO] [stdout] 204 | | table: &TableType, [INFO] [stdout] 205 | | style: &TableStyle, [INFO] [stdout] 206 | | vm_table_location: NonNull, [INFO] [stdout] 207 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::as_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:242:34 [INFO] [stdout] | [INFO] [stdout] 242 | let td = ptr.as_mut(); [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:212:5 [INFO] [stdout] | [INFO] [stdout] 212 | / unsafe fn new_inner( [INFO] [stdout] 213 | | table: &TableType, [INFO] [stdout] 214 | | style: &TableStyle, [INFO] [stdout] 215 | | vm_table_location: Option>, [INFO] [stdout] 216 | | ) -> Result { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:414:19 [INFO] [stdout] | [INFO] [stdout] 414 | let dst = self.base.add(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:399:5 [INFO] [stdout] | [INFO] [stdout] 399 | pub(crate) unsafe fn memory_copy(&self, dst: u32, src: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:415:19 [INFO] [stdout] | [INFO] [stdout] 415 | let src = self.base.add(src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:416:9 [INFO] [stdout] | [INFO] [stdout] 416 | ptr::copy(src, dst, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:442:19 [INFO] [stdout] | [INFO] [stdout] 442 | let dst = self.base.offset(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:431:5 [INFO] [stdout] | [INFO] [stdout] 431 | pub(crate) unsafe fn memory_fill(&self, dst: u32, val: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:443:9 [INFO] [stdout] | [INFO] [stdout] 443 | ptr::write_bytes(dst, val, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::NonNull::::new_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/table.rs:265:17 [INFO] [stdout] | [INFO] [stdout] 265 | NonNull::new_unchecked(boxed_ptr.get()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/table.rs:261:5 [INFO] [stdout] | [INFO] [stdout] 261 | unsafe fn get_vm_table_definition(&self) -> NonNull { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:612:14 [INFO] [stdout] | [INFO] [stdout] 612 | &mut self.storage.as_i32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:611:5 [INFO] [stdout] | [INFO] [stdout] 611 | pub unsafe fn as_i32_mut(&mut self) -> &mut i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:631:14 [INFO] [stdout] | [INFO] [stdout] 631 | &mut self.storage.as_u32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:630:5 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn as_u32_mut(&mut self) -> &mut u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:650:14 [INFO] [stdout] | [INFO] [stdout] 650 | &mut self.storage.as_i64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:649:5 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe fn as_i64_mut(&mut self) -> &mut i64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | &mut self.storage.as_u64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:668:5 [INFO] [stdout] | [INFO] [stdout] 668 | pub unsafe fn as_u64_mut(&mut self) -> &mut u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:688:14 [INFO] [stdout] | [INFO] [stdout] 688 | &mut self.storage.as_f32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:687:5 [INFO] [stdout] | [INFO] [stdout] 687 | pub unsafe fn as_f32_mut(&mut self) -> &mut f32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:707:14 [INFO] [stdout] | [INFO] [stdout] 707 | &mut self.storage.as_f64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:706:5 [INFO] [stdout] | [INFO] [stdout] 706 | pub unsafe fn as_f64_mut(&mut self) -> &mut f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:726:14 [INFO] [stdout] | [INFO] [stdout] 726 | &mut self.storage.as_funcref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:725:5 [INFO] [stdout] | [INFO] [stdout] 725 | pub unsafe fn as_funcref_mut(&mut self) -> &mut VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:738:14 [INFO] [stdout] | [INFO] [stdout] 738 | &mut self.storage.as_externref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:737:5 [INFO] [stdout] | [INFO] [stdout] 737 | pub unsafe fn as_externref_mut(&mut self) -> &mut VMExternRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:764:14 [INFO] [stdout] | [INFO] [stdout] 764 | &mut self.storage.as_u128 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn as_u128_mut(&mut self) -> &mut u128 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:780:14 [INFO] [stdout] | [INFO] [stdout] 780 | &mut self.storage.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:779:5 [INFO] [stdout] | [INFO] [stdout] 779 | pub unsafe fn as_bytes_mut(&mut self) -> &mut [u8; 16] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:10 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1075:5 [INFO] [stdout] | [INFO] [stdout] 1075 | pub unsafe fn instance(&self) -> &Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:12 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1086:9 [INFO] [stdout] | [INFO] [stdout] 1086 | self.instance().host_state() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1085:5 [INFO] [stdout] | [INFO] [stdout] 1085 | pub unsafe fn host_state(&self) -> &dyn Any { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | / catch_traps(|| { [INFO] [stdout] 153 | | mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] 157 | | }) [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | / pub unsafe fn near_vm_call_trampoline( [INFO] [stdout] 147 | | callee_env: VMFunctionEnvironment, [INFO] [stdout] 148 | | trampoline: VMTrampoline, [INFO] [stdout] 149 | | callee: *const VMFunctionBody, [INFO] [stdout] 150 | | values_vec: *mut u8, [INFO] [stdout] 151 | | ) -> Result<(), Trap> { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:153:9 [INFO] [stdout] | [INFO] [stdout] 153 | / mem::transmute::< [INFO] [stdout] 154 | | VMTrampoline, [INFO] [stdout] 155 | | extern "C" fn(VMFunctionEnvironment, *const VMFunctionBody, *mut u8), [INFO] [stdout] 156 | | >(trampoline)(callee_env, callee, values_vec); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::near_vm_register_setjmp` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:171:9 [INFO] [stdout] | [INFO] [stdout] 171 | / near_vm_register_setjmp( [INFO] [stdout] 172 | | cx.jmp_buf.as_ptr(), [INFO] [stdout] 173 | | call_closure::, [INFO] [stdout] 174 | | &mut closure as *mut F as *mut u8, [INFO] [stdout] 175 | | ) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:166:1 [INFO] [stdout] | [INFO] [stdout] 166 | / pub unsafe fn catch_traps(mut closure: F) -> Result<(), Trap> [INFO] [stdout] 167 | | where [INFO] [stdout] 168 | | F: FnMut(), [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::catch_traps` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:200:5 [INFO] [stdout] | [INFO] [stdout] 200 | / catch_traps(|| { [INFO] [stdout] 201 | | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] 202 | | })?; [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:195:1 [INFO] [stdout] | [INFO] [stdout] 195 | / pub unsafe fn catch_traps_with_result(mut closure: F) -> Result [INFO] [stdout] 196 | | where [INFO] [stdout] 197 | | F: FnMut() -> R, [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:201:9 [INFO] [stdout] | [INFO] [stdout] 201 | global_results.as_mut_ptr().write(closure()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:203:8 [INFO] [stdout] | [INFO] [stdout] 203 | Ok(global_results.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:339:24 [INFO] [stdout] | [INFO] [stdout] 339 | let prev = (*raw).prev.replace(ptr::null()); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:331:9 [INFO] [stdout] | [INFO] [stdout] 331 | pub unsafe fn take() -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:354:21 [INFO] [stdout] | [INFO] [stdout] 354 | assert!((*self.0).prev.get().is_null()); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/trap/traphandlers.rs:350:9 [INFO] [stdout] | [INFO] [stdout] 350 | pub unsafe fn replace(self) -> Result<(), super::Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/trap/traphandlers.rs:355:13 [INFO] [stdout] | [INFO] [stdout] 355 | (*self.0).prev.set(prev); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:20 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn near_vm_memory32_grow( [INFO] [stdout] 149 | | vmctx: *mut VMContext, [INFO] [stdout] 150 | | delta: u32, [INFO] [stdout] 151 | | memory_index: u32, [INFO] [stdout] 152 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:22 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:20 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn near_vm_imported_memory32_grow( [INFO] [stdout] 166 | | vmctx: *mut VMContext, [INFO] [stdout] 167 | | delta: u32, [INFO] [stdout] 168 | | memory_index: u32, [INFO] [stdout] 169 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | / instance [INFO] [stdout] 174 | | .imported_memory_grow(memory_index, delta) [INFO] [stdout] | |__________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:20 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | pub unsafe extern "C" fn near_vm_memory32_size(vmctx: *mut VMContext, memory_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:22 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:20 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | / pub unsafe extern "C" fn near_vm_imported_memory32_size( [INFO] [stdout] 199 | | vmctx: *mut VMContext, [INFO] [stdout] 200 | | memory_index: u32, [INFO] [stdout] 201 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:22 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:205:5 [INFO] [stdout] | [INFO] [stdout] 205 | instance.imported_memory_size(memory_index).0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:24 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / pub unsafe extern "C" fn near_vm_table_copy( [INFO] [stdout] 215 | | vmctx: *mut VMContext, [INFO] [stdout] 216 | | dst_table_index: u32, [INFO] [stdout] 217 | | src_table_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 220 | | len: u32, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:26 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:24 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:241:1 [INFO] [stdout] | [INFO] [stdout] 241 | / pub unsafe extern "C" fn near_vm_table_init( [INFO] [stdout] 242 | | vmctx: *mut VMContext, [INFO] [stdout] 243 | | table_index: u32, [INFO] [stdout] 244 | | elem_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 247 | | len: u32, [INFO] [stdout] 248 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:26 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:256:9 [INFO] [stdout] | [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:24 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:266:1 [INFO] [stdout] | [INFO] [stdout] 266 | / pub unsafe extern "C" fn near_vm_table_fill( [INFO] [stdout] 267 | | vmctx: *mut VMContext, [INFO] [stdout] 268 | | table_index: u32, [INFO] [stdout] 269 | | start_idx: u32, [INFO] [stdout] 270 | | item: RawTableElement, [INFO] [stdout] 271 | | len: u32, [INFO] [stdout] 272 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:26 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:277:56 [INFO] [stdout] | [INFO] [stdout] 277 | Type::ExternRef => TableElement::ExternRef(item.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:278:52 [INFO] [stdout] | [INFO] [stdout] 278 | Type::FuncRef => TableElement::FuncRef(item.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:285:9 [INFO] [stdout] | [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:20 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | pub unsafe extern "C" fn near_vm_table_size(vmctx: *mut VMContext, table_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:22 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:414:19 [INFO] [stdout] | [INFO] [stdout] 414 | let dst = self.base.add(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:399:5 [INFO] [stdout] | [INFO] [stdout] 399 | pub(crate) unsafe fn memory_copy(&self, dst: u32, src: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:20 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:308:1 [INFO] [stdout] | [INFO] [stdout] 308 | / pub unsafe extern "C" fn near_vm_imported_table_size( [INFO] [stdout] 309 | | vmctx: *mut VMContext, [INFO] [stdout] 310 | | table_index: u32, [INFO] [stdout] 311 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:415:19 [INFO] [stdout] | [INFO] [stdout] 415 | let src = self.base.add(src); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::copy` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:416:9 [INFO] [stdout] | [INFO] [stdout] 416 | ptr::copy(src, dst, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:22 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:315:5 [INFO] [stdout] | [INFO] [stdout] 315 | instance.imported_table_size(table_index) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:442:19 [INFO] [stdout] | [INFO] [stdout] 442 | let dst = self.base.offset(dst); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:431:5 [INFO] [stdout] | [INFO] [stdout] 431 | pub(crate) unsafe fn memory_fill(&self, dst: u32, val: u32, len: u32) -> Result<(), Trap> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:20 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:324:1 [INFO] [stdout] | [INFO] [stdout] 324 | / pub unsafe extern "C" fn near_vm_table_get( [INFO] [stdout] 325 | | vmctx: *mut VMContext, [INFO] [stdout] 326 | | table_index: u32, [INFO] [stdout] 327 | | elem_index: u32, [INFO] [stdout] 328 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:443:9 [INFO] [stdout] | [INFO] [stdout] 443 | ptr::write_bytes(dst, val, len as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:22 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:335:17 [INFO] [stdout] | [INFO] [stdout] 335 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:20 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | / pub unsafe extern "C" fn near_vm_imported_table_get( [INFO] [stdout] 346 | | vmctx: *mut VMContext, [INFO] [stdout] 347 | | table_index: u32, [INFO] [stdout] 348 | | elem_index: u32, [INFO] [stdout] 349 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:22 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:354:11 [INFO] [stdout] | [INFO] [stdout] 354 | match instance.imported_table_get(table_index, elem_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:356:17 [INFO] [stdout] | [INFO] [stdout] 356 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe extern "C" fn near_vm_table_set( [INFO] [stdout] 370 | | vmctx: *mut VMContext, [INFO] [stdout] 371 | | table_index: u32, [INFO] [stdout] 372 | | elem_index: u32, [INFO] [stdout] 373 | | value: RawTableElement, [INFO] [stdout] 374 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:22 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:379:56 [INFO] [stdout] | [INFO] [stdout] 379 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:380:52 [INFO] [stdout] | [INFO] [stdout] 380 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:386:13 [INFO] [stdout] | [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn near_vm_imported_table_set( [INFO] [stdout] 400 | | vmctx: *mut VMContext, [INFO] [stdout] 401 | | table_index: u32, [INFO] [stdout] 402 | | elem_index: u32, [INFO] [stdout] 403 | | value: RawTableElement, [INFO] [stdout] 404 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:22 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:408:52 [INFO] [stdout] | [INFO] [stdout] 408 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:409:48 [INFO] [stdout] | [INFO] [stdout] 409 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_set` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:412:18 [INFO] [stdout] | [INFO] [stdout] 412 | let result = instance.imported_table_set(table_index, elem_index, elem); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:414:9 [INFO] [stdout] | [INFO] [stdout] 414 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:612:14 [INFO] [stdout] | [INFO] [stdout] 612 | &mut self.storage.as_i32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:611:5 [INFO] [stdout] | [INFO] [stdout] 611 | pub unsafe fn as_i32_mut(&mut self) -> &mut i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:20 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:424:1 [INFO] [stdout] | [INFO] [stdout] 424 | / pub unsafe extern "C" fn near_vm_table_grow( [INFO] [stdout] 425 | | vmctx: *mut VMContext, [INFO] [stdout] 426 | | init_value: RawTableElement, [INFO] [stdout] 427 | | delta: u32, [INFO] [stdout] 428 | | table_index: u32, [INFO] [stdout] 429 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:430:22 [INFO] [stdout] | [INFO] [stdout] 430 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:631:14 [INFO] [stdout] | [INFO] [stdout] 631 | &mut self.storage.as_u32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:630:5 [INFO] [stdout] | [INFO] [stdout] 630 | pub unsafe fn as_u32_mut(&mut self) -> &mut u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:433:52 [INFO] [stdout] | [INFO] [stdout] 433 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:434:48 [INFO] [stdout] | [INFO] [stdout] 434 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:20 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:446:1 [INFO] [stdout] | [INFO] [stdout] 446 | / pub unsafe extern "C" fn near_vm_imported_table_grow( [INFO] [stdout] 447 | | vmctx: *mut VMContext, [INFO] [stdout] 448 | | init_value: RawTableElement, [INFO] [stdout] 449 | | delta: u32, [INFO] [stdout] 450 | | table_index: u32, [INFO] [stdout] 451 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:452:22 [INFO] [stdout] | [INFO] [stdout] 452 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:455:52 [INFO] [stdout] | [INFO] [stdout] 455 | Type::ExternRef => TableElement::ExternRef(init_value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:456:48 [INFO] [stdout] | [INFO] [stdout] 456 | Type::FuncRef => TableElement::FuncRef(init_value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | instance.imported_table_grow(table_index, delta, init_value).unwrap_or(u32::max_value()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:20 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:469:1 [INFO] [stdout] | [INFO] [stdout] 469 | pub unsafe extern "C" fn near_vm_func_ref(vmctx: *mut VMContext, function_index: u32) -> VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:470:22 [INFO] [stdout] | [INFO] [stdout] 470 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:20 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:507:1 [INFO] [stdout] | [INFO] [stdout] 507 | pub unsafe extern "C" fn near_vm_elem_drop(vmctx: *mut VMContext, elem_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:650:14 [INFO] [stdout] | [INFO] [stdout] 650 | &mut self.storage.as_i64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:649:5 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe fn as_i64_mut(&mut self) -> &mut i64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:509:22 [INFO] [stdout] | [INFO] [stdout] 509 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:669:14 [INFO] [stdout] | [INFO] [stdout] 669 | &mut self.storage.as_u64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:668:5 [INFO] [stdout] | [INFO] [stdout] 668 | pub unsafe fn as_u64_mut(&mut self) -> &mut u64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:688:14 [INFO] [stdout] | [INFO] [stdout] 688 | &mut self.storage.as_f32 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:687:5 [INFO] [stdout] | [INFO] [stdout] 687 | pub unsafe fn as_f32_mut(&mut self) -> &mut f32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:24 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:519:1 [INFO] [stdout] | [INFO] [stdout] 519 | / pub unsafe extern "C" fn near_vm_memory32_copy( [INFO] [stdout] 520 | | vmctx: *mut VMContext, [INFO] [stdout] 521 | | memory_index: u32, [INFO] [stdout] 522 | | dst: u32, [INFO] [stdout] 523 | | src: u32, [INFO] [stdout] 524 | | len: u32, [INFO] [stdout] 525 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:707:14 [INFO] [stdout] | [INFO] [stdout] 707 | &mut self.storage.as_f64 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:706:5 [INFO] [stdout] | [INFO] [stdout] 706 | pub unsafe fn as_f64_mut(&mut self) -> &mut f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:726:14 [INFO] [stdout] | [INFO] [stdout] 726 | &mut self.storage.as_funcref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:725:5 [INFO] [stdout] | [INFO] [stdout] 725 | pub unsafe fn as_funcref_mut(&mut self) -> &mut VMFuncRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:738:14 [INFO] [stdout] | [INFO] [stdout] 738 | &mut self.storage.as_externref [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:737:5 [INFO] [stdout] | [INFO] [stdout] 737 | pub unsafe fn as_externref_mut(&mut self) -> &mut VMExternRef { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:764:14 [INFO] [stdout] | [INFO] [stdout] 764 | &mut self.storage.as_u128 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:763:5 [INFO] [stdout] | [INFO] [stdout] 763 | pub unsafe fn as_u128_mut(&mut self) -> &mut u128 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:780:14 [INFO] [stdout] | [INFO] [stdout] 780 | &mut self.storage.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:779:5 [INFO] [stdout] | [INFO] [stdout] 779 | pub unsafe fn as_bytes_mut(&mut self) -> &mut [u8; 16] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:528:26 [INFO] [stdout] | [INFO] [stdout] 528 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:532:9 [INFO] [stdout] | [INFO] [stdout] 532 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:24 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:542:1 [INFO] [stdout] | [INFO] [stdout] 542 | / pub unsafe extern "C" fn near_vm_imported_memory32_copy( [INFO] [stdout] 543 | | vmctx: *mut VMContext, [INFO] [stdout] 544 | | memory_index: u32, [INFO] [stdout] 545 | | dst: u32, [INFO] [stdout] 546 | | src: u32, [INFO] [stdout] 547 | | len: u32, [INFO] [stdout] 548 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:551:26 [INFO] [stdout] | [INFO] [stdout] 551 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:555:9 [INFO] [stdout] | [INFO] [stdout] 555 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:24 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:565:1 [INFO] [stdout] | [INFO] [stdout] 565 | / pub unsafe extern "C" fn near_vm_memory32_fill( [INFO] [stdout] 566 | | vmctx: *mut VMContext, [INFO] [stdout] 567 | | memory_index: u32, [INFO] [stdout] 568 | | dst: u32, [INFO] [stdout] 569 | | val: u32, [INFO] [stdout] 570 | | len: u32, [INFO] [stdout] 571 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:574:26 [INFO] [stdout] | [INFO] [stdout] 574 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:578:9 [INFO] [stdout] | [INFO] [stdout] 578 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:24 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:588:1 [INFO] [stdout] | [INFO] [stdout] 588 | / pub unsafe extern "C" fn near_vm_imported_memory32_fill( [INFO] [stdout] 589 | | vmctx: *mut VMContext, [INFO] [stdout] 590 | | memory_index: u32, [INFO] [stdout] 591 | | dst: u32, [INFO] [stdout] 592 | | val: u32, [INFO] [stdout] 593 | | len: u32, [INFO] [stdout] 594 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:597:26 [INFO] [stdout] | [INFO] [stdout] 597 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:601:9 [INFO] [stdout] | [INFO] [stdout] 601 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:24 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / pub unsafe extern "C" fn near_vm_memory32_init( [INFO] [stdout] 612 | | vmctx: *mut VMContext, [INFO] [stdout] 613 | | memory_index: u32, [INFO] [stdout] 614 | | data_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 617 | | len: u32, [INFO] [stdout] 618 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:622:26 [INFO] [stdout] | [INFO] [stdout] 622 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:626:9 [INFO] [stdout] | [INFO] [stdout] 626 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:20 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:636:1 [INFO] [stdout] | [INFO] [stdout] 636 | pub unsafe extern "C" fn near_vm_data_drop(vmctx: *mut VMContext, data_index: u32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:638:22 [INFO] [stdout] | [INFO] [stdout] 638 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:651:5 [INFO] [stdout] | [INFO] [stdout] 651 | raise_lib_trap(trap) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:649:1 [INFO] [stdout] | [INFO] [stdout] 649 | pub unsafe extern "C" fn near_vm_raise_trap(trap_code: TrapCode) -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:10 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1075:5 [INFO] [stdout] | [INFO] [stdout] 1075 | pub unsafe fn instance(&self) -> &Instance { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1076:12 [INFO] [stdout] | [INFO] [stdout] 1076 | &*((self as *const Self as *mut u8).offset(-Instance::vmctx_offset()) as *const Instance) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/vmcontext.rs:1086:9 [INFO] [stdout] | [INFO] [stdout] 1086 | self.instance().host_state() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/vmcontext.rs:1085:5 [INFO] [stdout] | [INFO] [stdout] 1085 | pub unsafe fn host_state(&self) -> &dyn Any { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 37 previous errors; 144 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:20 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:148:1 [INFO] [stdout] | [INFO] [stdout] 148 | / pub unsafe extern "C" fn near_vm_memory32_grow( [INFO] [stdout] 149 | | vmctx: *mut VMContext, [INFO] [stdout] 150 | | delta: u32, [INFO] [stdout] 151 | | memory_index: u32, [INFO] [stdout] 152 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:153:22 [INFO] [stdout] | [INFO] [stdout] 153 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:20 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:165:1 [INFO] [stdout] | [INFO] [stdout] 165 | / pub unsafe extern "C" fn near_vm_imported_memory32_grow( [INFO] [stdout] 166 | | vmctx: *mut VMContext, [INFO] [stdout] 167 | | delta: u32, [INFO] [stdout] 168 | | memory_index: u32, [INFO] [stdout] 169 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:170:22 [INFO] [stdout] | [INFO] [stdout] 170 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_grow` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:173:5 [INFO] [stdout] | [INFO] [stdout] 173 | / instance [INFO] [stdout] 174 | | .imported_memory_grow(memory_index, delta) [INFO] [stdout] | |__________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:20 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:185:1 [INFO] [stdout] | [INFO] [stdout] 185 | pub unsafe extern "C" fn near_vm_memory32_size(vmctx: *mut VMContext, memory_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:186:22 [INFO] [stdout] | [INFO] [stdout] 186 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:20 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | / pub unsafe extern "C" fn near_vm_imported_memory32_size( [INFO] [stdout] 199 | | vmctx: *mut VMContext, [INFO] [stdout] 200 | | memory_index: u32, [INFO] [stdout] 201 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:202:22 [INFO] [stdout] | [INFO] [stdout] 202 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_memory_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:205:5 [INFO] [stdout] | [INFO] [stdout] 205 | instance.imported_memory_size(memory_index).0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:24 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:214:1 [INFO] [stdout] | [INFO] [stdout] 214 | / pub unsafe extern "C" fn near_vm_table_copy( [INFO] [stdout] 215 | | vmctx: *mut VMContext, [INFO] [stdout] 216 | | dst_table_index: u32, [INFO] [stdout] 217 | | src_table_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 220 | | len: u32, [INFO] [stdout] 221 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:225:26 [INFO] [stdout] | [INFO] [stdout] 225 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:231:9 [INFO] [stdout] | [INFO] [stdout] 231 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:24 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:241:1 [INFO] [stdout] | [INFO] [stdout] 241 | / pub unsafe extern "C" fn near_vm_table_init( [INFO] [stdout] 242 | | vmctx: *mut VMContext, [INFO] [stdout] 243 | | table_index: u32, [INFO] [stdout] 244 | | elem_index: u32, [INFO] [stdout] ... | [INFO] [stdout] 247 | | len: u32, [INFO] [stdout] 248 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:252:26 [INFO] [stdout] | [INFO] [stdout] 252 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:256:9 [INFO] [stdout] | [INFO] [stdout] 256 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:24 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:266:1 [INFO] [stdout] | [INFO] [stdout] 266 | / pub unsafe extern "C" fn near_vm_table_fill( [INFO] [stdout] 267 | | vmctx: *mut VMContext, [INFO] [stdout] 268 | | table_index: u32, [INFO] [stdout] 269 | | start_idx: u32, [INFO] [stdout] 270 | | item: RawTableElement, [INFO] [stdout] 271 | | len: u32, [INFO] [stdout] 272 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:275:26 [INFO] [stdout] | [INFO] [stdout] 275 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:277:56 [INFO] [stdout] | [INFO] [stdout] 277 | Type::ExternRef => TableElement::ExternRef(item.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:278:52 [INFO] [stdout] | [INFO] [stdout] 278 | Type::FuncRef => TableElement::FuncRef(item.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:285:9 [INFO] [stdout] | [INFO] [stdout] 285 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `near-vm-vm` (lib) due to 38 previous errors; 144 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:20 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:295:1 [INFO] [stdout] | [INFO] [stdout] 295 | pub unsafe extern "C" fn near_vm_table_size(vmctx: *mut VMContext, table_index: u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:296:22 [INFO] [stdout] | [INFO] [stdout] 296 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:20 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:308:1 [INFO] [stdout] | [INFO] [stdout] 308 | / pub unsafe extern "C" fn near_vm_imported_table_size( [INFO] [stdout] 309 | | vmctx: *mut VMContext, [INFO] [stdout] 310 | | table_index: u32, [INFO] [stdout] 311 | | ) -> u32 { [INFO] [stdout] | |________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:312:22 [INFO] [stdout] | [INFO] [stdout] 312 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_size` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:315:5 [INFO] [stdout] | [INFO] [stdout] 315 | instance.imported_table_size(table_index) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:20 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:324:1 [INFO] [stdout] | [INFO] [stdout] 324 | / pub unsafe extern "C" fn near_vm_table_get( [INFO] [stdout] 325 | | vmctx: *mut VMContext, [INFO] [stdout] 326 | | table_index: u32, [INFO] [stdout] 327 | | elem_index: u32, [INFO] [stdout] 328 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:329:22 [INFO] [stdout] | [INFO] [stdout] 329 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:335:17 [INFO] [stdout] | [INFO] [stdout] 335 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:20 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:345:1 [INFO] [stdout] | [INFO] [stdout] 345 | / pub unsafe extern "C" fn near_vm_imported_table_get( [INFO] [stdout] 346 | | vmctx: *mut VMContext, [INFO] [stdout] 347 | | table_index: u32, [INFO] [stdout] 348 | | elem_index: u32, [INFO] [stdout] 349 | | ) -> RawTableElement { [INFO] [stdout] | |____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:350:22 [INFO] [stdout] | [INFO] [stdout] 350 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `instance::Instance::imported_table_get` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:354:11 [INFO] [stdout] | [INFO] [stdout] 354 | match instance.imported_table_get(table_index, elem_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:356:17 [INFO] [stdout] | [INFO] [stdout] 356 | None => raise_lib_trap(Trap::lib(TrapCode::TableAccessOutOfBounds)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:20 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:369:1 [INFO] [stdout] | [INFO] [stdout] 369 | / pub unsafe extern "C" fn near_vm_table_set( [INFO] [stdout] 370 | | vmctx: *mut VMContext, [INFO] [stdout] 371 | | table_index: u32, [INFO] [stdout] 372 | | elem_index: u32, [INFO] [stdout] 373 | | value: RawTableElement, [INFO] [stdout] 374 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:375:22 [INFO] [stdout] | [INFO] [stdout] 375 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:379:56 [INFO] [stdout] | [INFO] [stdout] 379 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:380:52 [INFO] [stdout] | [INFO] [stdout] 380 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `trap::traphandlers::raise_lib_trap` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:386:13 [INFO] [stdout] | [INFO] [stdout] 386 | raise_lib_trap(trap); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `vmcontext::VMContext::instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:20 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/libcalls.rs:399:1 [INFO] [stdout] | [INFO] [stdout] 399 | / pub unsafe extern "C" fn near_vm_imported_table_set( [INFO] [stdout] 400 | | vmctx: *mut VMContext, [INFO] [stdout] 401 | | table_index: u32, [INFO] [stdout] 402 | | elem_index: u32, [INFO] [stdout] 403 | | value: RawTableElement, [INFO] [stdout] 404 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:405:22 [INFO] [stdout] | [INFO] [stdout] 405 | let instance = (&*vmctx).instance(); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:408:52 [INFO] [stdout] | [INFO] [stdout] 408 | Type::ExternRef => TableElement::ExternRef(value.extern_ref.into()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> src/libcalls.rs:409:48 [INFO] [stdout] | [INFO] [stdout] 409 | Type::FuncRef => TableElement::FuncRef(value.func_ref), [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [WARN] too many lines in the log, truncating it