[INFO] fetching crate neon 1.1.0-alpha.0... [INFO] checking neon-1.1.0-alpha.0 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate neon 1.1.0-alpha.0 into /workspace/builds/worker-4-tc2/source [INFO] validating manifest of crates.io crate neon 1.1.0-alpha.0 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate neon 1.1.0-alpha.0 [INFO] finished tweaking crates.io crate neon 1.1.0-alpha.0 [INFO] tweaked toml for crates.io crate neon 1.1.0-alpha.0 written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 83 packages to latest compatible versions [INFO] [stderr] Adding aquamarine v0.3.3 (available: v0.5.0) [INFO] [stderr] Adding bindgen v0.65.1 (available: v0.70.1) [INFO] [stderr] Adding bitflags v1.3.2 (available: v2.6.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding peeking_take_while v0.1.2 (available: v1.0.0) [INFO] [stderr] Adding rustc-hash v1.1.0 (available: v2.0.0) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasi v0.11.0+wasi-snapshot-preview1 (available: v0.13.2+wasi-0.2.1) [INFO] [stderr] Adding which v4.4.2 (available: v6.0.3) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] e99cf967ad66cd537fdfd47d46daaeeb205aff69f6da5072a5df3c9be938adbc [INFO] running `Command { std: "docker" "start" "-a" "e99cf967ad66cd537fdfd47d46daaeeb205aff69f6da5072a5df3c9be938adbc", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "e99cf967ad66cd537fdfd47d46daaeeb205aff69f6da5072a5df3c9be938adbc", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e99cf967ad66cd537fdfd47d46daaeeb205aff69f6da5072a5df3c9be938adbc", kill_on_drop: false }` [INFO] [stdout] e99cf967ad66cd537fdfd47d46daaeeb205aff69f6da5072a5df3c9be938adbc [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7ffb1520e88b065d1e461cfae2fe0685baf7e254afb6bbd62ca13e4151e3c532 [INFO] running `Command { std: "docker" "start" "-a" "7ffb1520e88b065d1e461cfae2fe0685baf7e254afb6bbd62ca13e4151e3c532", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (5 fixes) [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Compiling unicode-ident v1.0.13 [INFO] [stderr] Compiling libc v0.2.159 [INFO] [stderr] Compiling glob v0.3.1 [INFO] [stderr] Compiling prettyplease v0.2.22 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Compiling cfg-if v1.0.0 [INFO] [stderr] Compiling linux-raw-sys v0.4.14 [INFO] [stderr] Compiling regex-syntax v0.8.4 [INFO] [stderr] Compiling minimal-lexical v0.2.1 [INFO] [stderr] Compiling memchr v2.7.4 [INFO] [stderr] Compiling clang-sys v1.8.1 [INFO] [stderr] Compiling bitflags v2.6.0 [INFO] [stderr] Compiling libloading v0.8.5 [INFO] [stderr] Compiling nom v7.1.3 [INFO] [stderr] Compiling home v0.5.9 [INFO] [stderr] Compiling either v1.13.0 [INFO] [stderr] Compiling bindgen v0.65.1 [INFO] [stderr] Compiling shlex v1.3.0 [INFO] [stderr] Compiling lazy_static v1.5.0 [INFO] [stderr] Compiling quote v1.0.37 [INFO] [stderr] Compiling log v0.4.22 [INFO] [stderr] Compiling lazycell v1.3.0 [INFO] [stderr] Compiling bitflags v1.3.2 [INFO] [stderr] Compiling rustc-hash v1.1.0 [INFO] [stderr] Compiling peeking_take_while v0.1.2 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Compiling thiserror v1.0.64 [INFO] [stderr] Compiling semver v1.0.23 [INFO] [stderr] Compiling anyhow v1.0.89 [INFO] [stderr] Checking smallvec v1.13.2 [INFO] [stderr] Checking send_wrapper v0.6.0 [INFO] [stderr] Checking once_cell v1.19.0 [INFO] [stderr] Checking getrandom v0.2.15 [INFO] [stderr] Compiling cexpr v0.6.0 [INFO] [stderr] Compiling regex-automata v0.4.7 [INFO] [stderr] Checking widestring v1.1.0 [INFO] [stderr] Compiling which v4.4.2 [INFO] [stderr] Checking linkify v0.10.0 [INFO] [stderr] Compiling regex v1.10.6 [INFO] [stderr] Compiling thiserror-impl v1.0.64 [INFO] [stderr] Compiling linkme-impl v0.3.28 [INFO] [stderr] Compiling neon-macros v1.1.0-alpha.0 [INFO] [stderr] Checking linkme v0.3.28 [INFO] [stderr] Checking neon v1.1.0-alpha.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Checking psd v0.3.5 [INFO] [stderr] Compiling nodejs-sys v0.15.0 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `neon` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/context/mod.rs [INFO] [stderr] * src/lifecycle.rs [INFO] [stderr] * src/types_impl/buffer/types.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/types_impl/buffer/types.rs:25:6 [INFO] [stderr] | [INFO] [stderr] 25 | {$comment:expr_2021, $decl:item} => { $decl }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/types_impl/buffer/types.rs:782:79 [INFO] [stderr] | [INFO] [stderr] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr_2021$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/context/mod.rs:264:38 [INFO] [stderr] | [INFO] [stderr] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stderr] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stderr] | | [INFO] [stderr] | lifetime `'b` declared here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/context/mod.rs:536:65 [INFO] [stderr] | [INFO] [stderr] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stderr] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:105:71 [INFO] [stderr] | [INFO] [stderr] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stderr] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:116:81 [INFO] [stderr] | [INFO] [stderr] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stderr] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:132:17 [INFO] [stderr] | [INFO] [stderr] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stderr] | ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/context/internal.rs:69:3 [INFO] [stdout] | [INFO] [stdout] 69 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 69 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: aborting due to 2 previous errors; 5 warnings emitted [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:264:38 [INFO] [stdout] | [INFO] [stdout] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stdout] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stdout] | | [INFO] [stdout] | lifetime `'b` declared here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:536:65 [INFO] [stdout] | [INFO] [stdout] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stdout] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/types_impl/buffer/types.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | {$comment:expr, $decl:item} => { $decl }; [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 25 | {$comment:expr_2021, $decl:item} => { $decl }; [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Original diagnostics will follow. [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/types_impl/buffer/types.rs:782:84 [INFO] [stdout] | [INFO] [stdout] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr_2021$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:105:71 [INFO] [stdout] | [INFO] [stdout] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:116:81 [INFO] [stdout] | [INFO] [stdout] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stdout] | ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::catch_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | if sys::error::catch_error(self.to_raw(), local.as_mut_ptr()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | / pub(super) unsafe fn try_catch(self, f: F) -> Result [INFO] [stdout] 33 | | where [INFO] [stdout] 34 | | F: FnOnce() -> Result, [INFO] [stdout] | |_______________________________________________________^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:40:17 [INFO] [stdout] | [INFO] [stdout] 40 | Err(local.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::setup` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | sys::setup(env); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:70:1 [INFO] [stdout] | [INFO] [stdout] 70 | unsafe extern "C" fn napi_register_module_v1(env: *mut c_void, m: *mut c_void) -> *mut c_void { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types_impl::private::ValueInternal::from_local` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:80:40 [INFO] [stdout] | [INFO] [stdout] 80 | let exports = Handle::new_internal(JsObject::from_local(env, m.cast())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::reference::unreference` is unsafe and requires unsafe block [INFO] [stdout] --> src/handle/root.rs:34:9 [INFO] [stdout] | [INFO] [stdout] 34 | reference::unreference(env, self.0.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/handle/root.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | pub(crate) unsafe fn unref(self, env: raw::Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | sys::object::get_index(out, cx.env().to_raw(), obj, self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:65:5 [INFO] [stdout] | [INFO] [stdout] 65 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 66 | | self, [INFO] [stdout] 67 | | cx: &mut C, [INFO] [stdout] 68 | | out: &mut raw::Local, [INFO] [stdout] 69 | | obj: raw::Local, [INFO] [stdout] 70 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:81:9 [INFO] [stdout] | [INFO] [stdout] 81 | sys::object::set_index(out, cx.env().to_raw(), obj, self, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 75 | | self, [INFO] [stdout] 76 | | cx: &mut C, [INFO] [stdout] 77 | | out: &mut bool, [INFO] [stdout] 78 | | obj: raw::Local, [INFO] [stdout] 79 | | val: raw::Local, [INFO] [stdout] 80 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:94:9 [INFO] [stdout] | [INFO] [stdout] 94 | sys::object::get(out, env, obj, self.to_local()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 87 | | self, [INFO] [stdout] 88 | | cx: &mut C, [INFO] [stdout] 89 | | out: &mut raw::Local, [INFO] [stdout] 90 | | obj: raw::Local, [INFO] [stdout] 91 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | sys::object::set(out, env, obj, self.to_local(), val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 98 | | self, [INFO] [stdout] 99 | | cx: &mut C, [INFO] [stdout] 100 | | out: &mut bool, [INFO] [stdout] 101 | | obj: raw::Local, [INFO] [stdout] 102 | | val: raw::Local, [INFO] [stdout] 103 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:120:9 [INFO] [stdout] | [INFO] [stdout] 120 | sys::object::get_string(env, out, obj, ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:111:5 [INFO] [stdout] | [INFO] [stdout] 111 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 112 | | self, [INFO] [stdout] 113 | | cx: &mut C, [INFO] [stdout] 114 | | out: &mut raw::Local, [INFO] [stdout] 115 | | obj: raw::Local, [INFO] [stdout] 116 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | sys::object::set_string(env, out, obj, ptr, len, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 124 | | self, [INFO] [stdout] 125 | | cx: &mut C, [INFO] [stdout] 126 | | out: &mut bool, [INFO] [stdout] 127 | | obj: raw::Local, [INFO] [stdout] 128 | | val: raw::Local, [INFO] [stdout] 129 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_array_with_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | napi::create_array_with_length(env, length, out as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(out: &mut Local, env: Env, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_array_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:23:9 [INFO] [stdout] | [INFO] [stdout] 23 | napi::get_array_length(env, array, &mut len as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | pub unsafe fn len(env: Env, array: Local) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_arraybuffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:12:18 [INFO] [stdout] | [INFO] [stdout] 12 | let status = napi::create_arraybuffer(env, len, null_mut(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | Ok(buf.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:57:1 [INFO] [stdout] | [INFO] [stdout] 57 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:31 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:80:9 [INFO] [stdout] | [INFO] [stdout] 80 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:75:1 [INFO] [stdout] | [INFO] [stdout] 75 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | / napi::create_async_work( [INFO] [stdout] 63 | | env, [INFO] [stdout] 64 | | ptr::null_mut(), [INFO] [stdout] 65 | | super::string(env, "neon_async_work"), [INFO] [stdout] ... | [INFO] [stdout] 69 | | work, [INFO] [stdout] 70 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | / pub unsafe fn schedule( [INFO] [stdout] 37 | | env: Env, [INFO] [stdout] 38 | | input: I, [INFO] [stdout] 39 | | execute: Execute, [INFO] [stdout] ... | [INFO] [stdout] 44 | | O: Send + 'static, [INFO] [stdout] 45 | | D: 'static, [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:65:13 [INFO] [stdout] | [INFO] [stdout] 65 | super::string(env, "neon_async_work"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::queue_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:11 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:39 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:13 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:42 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:128:21 [INFO] [stdout] | [INFO] [stdout] 128 | let data = &mut *data.cast::>(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | unsafe extern "C" fn call_execute(_: Env, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:153:10 [INFO] [stdout] | [INFO] [stdout] 153 | } = *Box::>::from_raw(data.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | unsafe extern "C" fn call_complete(env: Env, status: napi::Status, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:155:5 [INFO] [stdout] | [INFO] [stdout] 155 | napi::delete_async_work(env, work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::FailureBoundary::catch_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:157:5 [INFO] [stdout] | [INFO] [stdout] 157 | / BOUNDARY.catch_failure(env, None, move |env| { [INFO] [stdout] 158 | | // `unwrap` is okay because `call_complete` should be called exactly once [INFO] [stdout] 159 | | // if and only if `call_execute` has completed successfully [INFO] [stdout] 160 | | let output = state.into_output().unwrap(); [INFO] [stdout] ... | [INFO] [stdout] 180 | | ptr::null_mut() [INFO] [stdout] 181 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::buffer::uninitialized` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:11:24 [INFO] [stdout] | [INFO] [stdout] 11 | let (buf, bytes) = uninitialized(env, len)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | std::ptr::write_bytes(bytes, 0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_buffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:21:18 [INFO] [stdout] | [INFO] [stdout] 21 | let status = napi::create_buffer(env, len, bytes.as_mut_ptr(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | pub unsafe fn uninitialized(env: Env, len: usize) -> Result<(Local, *mut u8), napi::Status> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:28 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:66:1 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:31 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:84:1 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_new_target` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:36:18 [INFO] [stdout] | [INFO] [stdout] 36 | let status = napi::get_new_target(env, info, target.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn is_construct(env: Env, info: FunctionCallbackInfo) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:41:25 [INFO] [stdout] | [INFO] [stdout] 41 | let target: Local = target.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:50:18 [INFO] [stdout] | [INFO] [stdout] 50 | let status = napi::get_cb_info(env, info, null_mut(), null_mut(), out as *mut _, null_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | pub unsafe fn this(env: Env, info: FunctionCallbackInfo, out: &mut Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:58:18 [INFO] [stdout] | [INFO] [stdout] 58 | let status = napi::get_cb_info( [INFO] [stdout] | __________________^ [INFO] [stdout] 59 | | env, [INFO] [stdout] 60 | | info, [INFO] [stdout] 61 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 64 | | null_mut(), [INFO] [stdout] 65 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:56:1 [INFO] [stdout] | [INFO] [stdout] 56 | pub unsafe fn len(env: Env, info: FunctionCallbackInfo) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | / napi::get_cb_info( [INFO] [stdout] 80 | | env, [INFO] [stdout] 81 | | info, [INFO] [stdout] 82 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 85 | | null_mut(), [INFO] [stdout] 86 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | pub unsafe fn argv(env: Env, info: FunctionCallbackInfo) -> Arguments { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:96:13 [INFO] [stdout] | [INFO] [stdout] 96 | / napi::get_cb_info( [INFO] [stdout] 97 | | env, [INFO] [stdout] 98 | | info, [INFO] [stdout] 99 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 102 | | null_mut(), [INFO] [stdout] 103 | | ), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:108:9 [INFO] [stdout] | [INFO] [stdout] 108 | argv.set_len(argc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:113:36 [INFO] [stdout] | [INFO] [stdout] 113 | SmallVec::from_buf_and_len(argv.assume_init(), argc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::coerce_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/convert.rs:7:18 [INFO] [stdout] | [INFO] [stdout] 7 | let status = napi::coerce_to_string(env, value, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/convert.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | pub unsafe fn to_string(out: &mut Local, env: Env, value: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:11:18 [INFO] [stdout] | [INFO] [stdout] 11 | let status = napi::is_exception_pending(env, b.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn is_throwing(env: Env) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | b.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::is_throwing` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:19:9 [INFO] [stdout] | [INFO] [stdout] 19 | if !is_throwing(env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | pub unsafe fn catch_error(env: Env, error: *mut Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | let status = napi::get_and_clear_last_exception(env, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:32:18 [INFO] [stdout] | [INFO] [stdout] 32 | let status = napi::is_exception_pending(env, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe fn clear_exception(env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:36:9 [INFO] [stdout] | [INFO] [stdout] 36 | if !result.assume_init() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:41:18 [INFO] [stdout] | [INFO] [stdout] 41 | let status = napi::get_and_clear_last_exception(env, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::throw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:47:18 [INFO] [stdout] | [INFO] [stdout] 47 | let status = napi::throw(env, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:46:1 [INFO] [stdout] | [INFO] [stdout] 46 | pub unsafe fn throw(env: Env, val: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:54:18 [INFO] [stdout] | [INFO] [stdout] 54 | let status = napi::create_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn new_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:58:12 [INFO] [stdout] | [INFO] [stdout] 58 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_type_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:63:18 [INFO] [stdout] | [INFO] [stdout] 63 | let status = napi::create_type_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:61:1 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn new_type_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:67:12 [INFO] [stdout] | [INFO] [stdout] 67 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_range_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:72:18 [INFO] [stdout] | [INFO] [stdout] 72 | let status = napi::create_range_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:70:1 [INFO] [stdout] | [INFO] [stdout] 70 | pub unsafe fn new_range_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:76:12 [INFO] [stdout] | [INFO] [stdout] 76 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:81:18 [INFO] [stdout] | [INFO] [stdout] 81 | let status = napi::create_string_utf8(env, msg as *const _, len as usize, out.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:79:1 [INFO] [stdout] | [INFO] [stdout] 79 | pub unsafe fn throw_error_from_utf8(env: Env, msg: *const u8, len: i32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:86:18 [INFO] [stdout] | [INFO] [stdout] 86 | let status = napi::create_error(env, ptr::null_mut(), out.assume_init(), err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:86:59 [INFO] [stdout] | [INFO] [stdout] 86 | let status = napi::create_error(env, ptr::null_mut(), out.assume_init(), err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::throw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | throw(env, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:90:16 [INFO] [stdout] | [INFO] [stdout] 90 | throw(env, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | / napi::fatal_error( [INFO] [stdout] 98 | | location.as_ptr().cast(), [INFO] [stdout] 99 | | location.len(), [INFO] [stdout] 100 | | message.as_ptr().cast(), [INFO] [stdout] 101 | | message.len(), [INFO] [stdout] 102 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | pub(super) unsafe fn fatal_error(message: &str) -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::typeof_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:33:18 [INFO] [stdout] | [INFO] [stdout] 33 | let status = napi::typeof_value(env, local, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/external.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn deref(env: Env, local: Local) -> Option<*const T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:37:18 [INFO] [stdout] | [INFO] [stdout] 37 | let result = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::check_object_type_tag` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | if !super::tag::check_object_type_tag(env, local, &crate::MODULE_TAG) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:53:18 [INFO] [stdout] | [INFO] [stdout] 53 | let status = napi::get_value_external(env, local, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:57:13 [INFO] [stdout] | [INFO] [stdout] 57 | let v = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:58:15 [INFO] [stdout] | [INFO] [stdout] 58 | let v = &**v.cast_const().cast::>() as *const T; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:68:18 [INFO] [stdout] | [INFO] [stdout] 68 | let status = napi::create_external( [INFO] [stdout] | __________________^ [INFO] [stdout] 69 | | env, [INFO] [stdout] 70 | | Box::into_raw(v) as *mut _, [INFO] [stdout] 71 | | Some(finalize_external::), [INFO] [stdout] ... | [INFO] [stdout] 75 | | result.as_mut_ptr(), [INFO] [stdout] 76 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/external.rs:64:1 [INFO] [stdout] | [INFO] [stdout] 64 | pub unsafe fn create(env: Env, v: T, finalizer: fn(Env, T)) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:82:20 [INFO] [stdout] | [INFO] [stdout] 82 | let external = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | super::tag::type_tag_object(env, external, &crate::MODULE_TAG); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:16:18 [INFO] [stdout] | [INFO] [stdout] 16 | let status = napi::create_function( [INFO] [stdout] | __________________^ [INFO] [stdout] 17 | | env, [INFO] [stdout] 18 | | name.as_ptr().cast(), [INFO] [stdout] 19 | | name.len(), [INFO] [stdout] ... | [INFO] [stdout] 22 | | out.as_mut_ptr(), [INFO] [stdout] 23 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / pub unsafe fn new(env: Env, name: &str, callback: F) -> Result [INFO] [stdout] 11 | | where [INFO] [stdout] 12 | | F: Fn(Env, napi::CallbackInfo) -> Local + 'static, [INFO] [stdout] | |______________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:26:14 [INFO] [stdout] | [INFO] [stdout] 26 | drop(Box::from_raw(data)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:33:15 [INFO] [stdout] | [INFO] [stdout] 33 | let out = out.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::add_finalizer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:45:22 [INFO] [stdout] | [INFO] [stdout] 45 | let status = napi::add_finalizer( [INFO] [stdout] | ______________________^ [INFO] [stdout] 46 | | env, [INFO] [stdout] 47 | | out, [INFO] [stdout] 48 | | ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 51 | | ptr::null_mut(), [INFO] [stdout] 52 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:42:18 [INFO] [stdout] | [INFO] [stdout] 42 | drop(Box::from_raw(finalize_hint.cast::())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | / unsafe extern "C" fn drop_function( [INFO] [stdout] 38 | | _env: Env, [INFO] [stdout] 39 | | _finalize_data: *mut c_void, [INFO] [stdout] 40 | | finalize_hint: *mut c_void, [INFO] [stdout] 41 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:70:18 [INFO] [stdout] | [INFO] [stdout] 70 | let status = napi::get_cb_info( [INFO] [stdout] | __________________^ [INFO] [stdout] 71 | | env, [INFO] [stdout] 72 | | info, [INFO] [stdout] 73 | | ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 76 | | data.as_mut_ptr(), [INFO] [stdout] 77 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:65:1 [INFO] [stdout] | [INFO] [stdout] 65 | / unsafe extern "C" fn call_boxed(env: Env, info: napi::CallbackInfo) -> Local [INFO] [stdout] 66 | | where [INFO] [stdout] 67 | | F: Fn(Env, napi::CallbackInfo) -> Local + 'static, [INFO] [stdout] | |______________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:81:21 [INFO] [stdout] | [INFO] [stdout] 81 | let callback = &*data.assume_init().cast::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:81:22 [INFO] [stdout] | [INFO] [stdout] 81 | let callback = &*data.assume_init().cast::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::call_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:94:18 [INFO] [stdout] | [INFO] [stdout] 94 | let status = napi::call_function( [INFO] [stdout] | __________________^ [INFO] [stdout] 95 | | env, [INFO] [stdout] 96 | | this, [INFO] [stdout] 97 | | fun, [INFO] [stdout] ... | [INFO] [stdout] 100 | | out as *mut _, [INFO] [stdout] 101 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:86:1 [INFO] [stdout] | [INFO] [stdout] 86 | / pub unsafe fn call( [INFO] [stdout] 87 | | out: &mut Local, [INFO] [stdout] 88 | | env: Env, [INFO] [stdout] 89 | | fun: Local, [INFO] [stdout] ... | [INFO] [stdout] 92 | | argv: *const c_void, [INFO] [stdout] 93 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::new_instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:113:18 [INFO] [stdout] | [INFO] [stdout] 113 | let status = napi::new_instance(env, fun, argc as usize, argv as *const _, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:106:1 [INFO] [stdout] | [INFO] [stdout] 106 | / pub unsafe fn construct( [INFO] [stdout] 107 | | out: &mut Local, [INFO] [stdout] 108 | | env: Env, [INFO] [stdout] 109 | | fun: Local, [INFO] [stdout] 110 | | argc: i32, [INFO] [stdout] 111 | | argv: *const c_void, [INFO] [stdout] 112 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::strict_equals` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mem.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | napi::strict_equals(env, lhs, rhs, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mem.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | pub unsafe fn strict_equals(env: Env, lhs: Local, rhs: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::panic_msg` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:68:27 [INFO] [stdout] | [INFO] [stdout] 68 | let msg = panic_msg(&panic).unwrap_or(UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | / pub unsafe fn catch_failure(&self, env: Env, deferred: Option, f: F) [INFO] [stdout] 51 | | where [INFO] [stdout] 52 | | F: FnOnce(Option) -> Local, [INFO] [stdout] | |________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:70:17 [INFO] [stdout] | [INFO] [stdout] 70 | fatal_error(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::catch_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:78:25 [INFO] [stdout] | [INFO] [stdout] 78 | let exception = catch_exception(env); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:89:21 [INFO] [stdout] | [INFO] [stdout] 89 | reject_deferred(env, deferred, err); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:103:21 [INFO] [stdout] | [INFO] [stdout] 103 | resolve_deferred(env, deferred, *value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:112:25 [INFO] [stdout] | [INFO] [stdout] 112 | let error = create_error(env, msg, exception, panic.err()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:114:13 [INFO] [stdout] | [INFO] [stdout] 114 | reject_deferred(env, deferred, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:119:21 [INFO] [stdout] | [INFO] [stdout] 119 | let error = create_error(env, msg, exception, panic.err()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::fatal_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:122:9 [INFO] [stdout] | [INFO] [stdout] 122 | fatal_exception(env, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:146:26 [INFO] [stdout] | [INFO] [stdout] 146 | let deferred = match napi::create_promise(env, deferred.as_mut_ptr(), promise.as_mut_ptr()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe fn fatal_exception(env: Env, error: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:147:29 [INFO] [stdout] | [INFO] [stdout] 147 | napi::Status::Ok => deferred.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:148:14 [INFO] [stdout] | [INFO] [stdout] 148 | _ => fatal_error("Failed to create a promise"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:151:8 [INFO] [stdout] | [INFO] [stdout] 151 | if napi::reject_deferred(env, deferred, error) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:152:9 [INFO] [stdout] | [INFO] [stdout] 152 | fatal_error("Failed to reject a promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:164:17 [INFO] [stdout] | [INFO] [stdout] 164 | let error = error_from_message(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:157:1 [INFO] [stdout] | [INFO] [stdout] 157 | / unsafe fn create_error( [INFO] [stdout] 158 | | env: Env, [INFO] [stdout] 159 | | msg: &str, [INFO] [stdout] 160 | | exception: Option, [INFO] [stdout] 161 | | panic: Option, [INFO] [stdout] 162 | | ) -> Local { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:168:9 [INFO] [stdout] | [INFO] [stdout] 168 | set_property(env, error, "cause", exception); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | set_property(env, error, "panic", error_from_panic(env, panic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_panic` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:173:43 [INFO] [stdout] | [INFO] [stdout] 173 | set_property(env, error, "panic", error_from_panic(env, panic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:181:8 [INFO] [stdout] | [INFO] [stdout] 181 | if napi::resolve_deferred(env, deferred, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:180:1 [INFO] [stdout] | [INFO] [stdout] 180 | unsafe fn resolve_deferred(env: Env, deferred: napi::Deferred, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | fatal_error("Failed to resolve promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:188:8 [INFO] [stdout] | [INFO] [stdout] 188 | if napi::reject_deferred(env, deferred, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:187:1 [INFO] [stdout] | [INFO] [stdout] 187 | unsafe fn reject_deferred(env: Env, deferred: napi::Deferred, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:189:9 [INFO] [stdout] | [INFO] [stdout] 189 | fatal_error("Failed to reject promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:195:9 [INFO] [stdout] | [INFO] [stdout] 195 | if !is_exception_pending(env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:194:1 [INFO] [stdout] | [INFO] [stdout] 194 | unsafe fn catch_exception(env: Env) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:201:8 [INFO] [stdout] | [INFO] [stdout] 201 | if napi::get_and_clear_last_exception(env, error.as_mut_ptr()) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:202:9 [INFO] [stdout] | [INFO] [stdout] 202 | fatal_error("Failed to get and clear the last exception"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:205:10 [INFO] [stdout] | [INFO] [stdout] 205 | Some(error.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:210:15 [INFO] [stdout] | [INFO] [stdout] 210 | let msg = create_string(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:209:1 [INFO] [stdout] | [INFO] [stdout] 209 | unsafe fn error_from_message(env: Env, msg: &str) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:213:18 [INFO] [stdout] | [INFO] [stdout] 213 | let status = napi::create_error(env, ptr::null_mut(), msg, err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | err.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:218:9 [INFO] [stdout] | [INFO] [stdout] 218 | fatal_error("Failed to create an Error"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::panic_msg` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:224:24 [INFO] [stdout] | [INFO] [stdout] 224 | if let Some(msg) = panic_msg(&panic) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | unsafe fn error_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:225:9 [INFO] [stdout] | [INFO] [stdout] 225 | error_from_message(env, msg) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:227:21 [INFO] [stdout] | [INFO] [stdout] 227 | let error = error_from_message(env, UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::external_from_panic` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:228:21 [INFO] [stdout] | [INFO] [stdout] 228 | let panic = external_from_panic(env, panic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:230:9 [INFO] [stdout] | [INFO] [stdout] 230 | set_property(env, error, "cause", panic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:237:15 [INFO] [stdout] | [INFO] [stdout] 237 | let key = create_string(env, key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:236:1 [INFO] [stdout] | [INFO] [stdout] 236 | unsafe fn set_property(env: Env, object: Local, key: &str, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:239:8 [INFO] [stdout] | [INFO] [stdout] 239 | if napi::set_property(env, object, key, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:240:9 [INFO] [stdout] | [INFO] [stdout] 240 | fatal_error("Failed to set an object property"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:256:19 [INFO] [stdout] | [INFO] [stdout] 256 | let fail = || fatal_error("Failed to create a neon::types::JsBox from a panic"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:255:1 [INFO] [stdout] | [INFO] [stdout] 255 | unsafe fn external_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:258:18 [INFO] [stdout] | [INFO] [stdout] 258 | let status = napi::create_external( [INFO] [stdout] | __________________^ [INFO] [stdout] 259 | | env, [INFO] [stdout] 260 | | Box::into_raw(Box::new(DebugSendWrapper::new(panic))).cast(), [INFO] [stdout] 261 | | Some(finalize_panic), [INFO] [stdout] 262 | | ptr::null_mut(), [INFO] [stdout] 263 | | result.as_mut_ptr(), [INFO] [stdout] 264 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:255:1 [INFO] [stdout] | [INFO] [stdout] 255 | unsafe fn external_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:270:20 [INFO] [stdout] | [INFO] [stdout] 270 | let external = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:273:8 [INFO] [stdout] | [INFO] [stdout] 273 | if napi::type_tag_object(env, external, &*crate::MODULE_TAG) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:289:18 [INFO] [stdout] | [INFO] [stdout] 289 | let status = napi::create_string_utf8(env, msg.as_ptr().cast(), msg.len(), string.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:287:1 [INFO] [stdout] | [INFO] [stdout] 287 | unsafe fn create_string(env: Env, msg: &str) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:292:9 [INFO] [stdout] | [INFO] [stdout] 292 | fatal_error("Failed to create a String"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:295:5 [INFO] [stdout] | [INFO] [stdout] 295 | string.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:301:8 [INFO] [stdout] | [INFO] [stdout] 301 | if napi::is_exception_pending(env, &mut throwing) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:298:1 [INFO] [stdout] | [INFO] [stdout] 298 | unsafe fn is_exception_pending(env: Env) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:302:9 [INFO] [stdout] | [INFO] [stdout] 302 | fatal_error("Failed to check if an exception is pending"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:10:5 [INFO] [stdout] | [INFO] [stdout] 10 | napi::create_object(env, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:9:1 [INFO] [stdout] | [INFO] [stdout] 9 | pub unsafe fn new(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::object_freeze` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:15:18 [INFO] [stdout] | [INFO] [stdout] 15 | let status = napi::object_freeze(env, obj); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn freeze(env: Env, obj: Local) -> napi::Status { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::object_seal` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:25:5 [INFO] [stdout] | [INFO] [stdout] 25 | napi::object_seal(env, obj) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:24:1 [INFO] [stdout] | [INFO] [stdout] 24 | pub unsafe fn seal(env: Env, obj: Local) -> napi::Status { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::get_all_property_names` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:34:8 [INFO] [stdout] | [INFO] [stdout] 34 | if napi::get_all_property_names( [INFO] [stdout] | ________^ [INFO] [stdout] 35 | | env, [INFO] [stdout] 36 | | object, [INFO] [stdout] 37 | | napi::KeyCollectionMode::OwnOnly, [INFO] [stdout] ... | [INFO] [stdout] 40 | | property_names.as_mut_ptr(), [INFO] [stdout] 41 | | ) != napi::Status::Ok [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn get_own_property_names(out: &mut Local, env: Env, object: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:46:12 [INFO] [stdout] | [INFO] [stdout] 46 | *out = property_names.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_element` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:53:18 [INFO] [stdout] | [INFO] [stdout] 53 | let status = napi::get_element(env, object, index, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn get_index(out: &mut Local, env: Env, object: Local, index: u32) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_element` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:66:18 [INFO] [stdout] | [INFO] [stdout] 66 | let status = napi::set_element(env, object, index, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:65:1 [INFO] [stdout] | [INFO] [stdout] 65 | pub unsafe fn set_index(out: &mut bool, env: Env, object: Local, index: u32, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:84:8 [INFO] [stdout] | [INFO] [stdout] 84 | if napi::create_string_utf8(env, key as *const _, len as usize, key_val.as_mut_ptr()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:73:1 [INFO] [stdout] | [INFO] [stdout] 73 | / pub unsafe fn get_string( [INFO] [stdout] 74 | | env: Env, [INFO] [stdout] 75 | | out: &mut Local, [INFO] [stdout] 76 | | object: Local, [INFO] [stdout] 77 | | key: *const u8, [INFO] [stdout] 78 | | len: i32, [INFO] [stdout] 79 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:91:8 [INFO] [stdout] | [INFO] [stdout] 91 | if napi::get_property(env, object, key_val.assume_init(), out as *mut _) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:91:40 [INFO] [stdout] | [INFO] [stdout] 91 | if napi::get_property(env, object, key_val.assume_init(), out as *mut _) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:116:8 [INFO] [stdout] | [INFO] [stdout] 116 | if napi::create_string_utf8(env, key as *const _, len as usize, key_val.as_mut_ptr()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe fn set_string( [INFO] [stdout] 105 | | env: Env, [INFO] [stdout] 106 | | out: &mut bool, [INFO] [stdout] 107 | | object: Local, [INFO] [stdout] ... | [INFO] [stdout] 110 | | val: Local, [INFO] [stdout] 111 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:123:8 [INFO] [stdout] | [INFO] [stdout] 123 | if napi::set_property(env, object, key_val.assume_init(), val) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:123:40 [INFO] [stdout] | [INFO] [stdout] 123 | if napi::set_property(env, object, key_val.assume_init(), val) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:134:18 [INFO] [stdout] | [INFO] [stdout] 134 | let status = napi::get_property(env, object, key, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:133:1 [INFO] [stdout] | [INFO] [stdout] 133 | pub unsafe fn get(out: &mut Local, env: Env, object: Local, key: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 146 | let status = napi::set_property(env, object, key, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:145:1 [INFO] [stdout] | [INFO] [stdout] 145 | pub unsafe fn set(out: &mut bool, env: Env, object: Local, key: Local, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_undefined` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 8 | napi::get_undefined(env, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | pub unsafe fn undefined(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_null` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | napi::get_null(env, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | pub unsafe fn null(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_boolean` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | napi::get_boolean(env, b, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | pub unsafe fn boolean(out: &mut Local, env: Env, b: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_bool` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:26:9 [INFO] [stdout] | [INFO] [stdout] 26 | napi::get_value_bool(env, p, &mut value as *mut bool), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn boolean_value(env: Env, p: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_double` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:35:5 [INFO] [stdout] | [INFO] [stdout] 35 | napi::create_double(env, v, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | pub unsafe fn number(out: &mut Local, env: Env, v: f64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_double` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:43:9 [INFO] [stdout] | [INFO] [stdout] 43 | napi::get_value_double(env, p, &mut value as *mut f64), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:40:1 [INFO] [stdout] | [INFO] [stdout] 40 | pub unsafe fn number_value(env: Env, p: Local) -> f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:19:9 [INFO] [stdout] | [INFO] [stdout] 19 | napi::create_promise(env, deferred.as_mut_ptr(), promise.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn create(env: Env) -> (napi::Deferred, napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:23:6 [INFO] [stdout] | [INFO] [stdout] 23 | (deferred.assume_init(), promise.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:23:30 [INFO] [stdout] | [INFO] [stdout] 23 | (deferred.assume_init(), promise.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | napi::resolve_deferred(env, deferred, resolution), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn resolve(env: Env, deferred: napi::Deferred, resolution: napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | napi::reject_deferred(env, deferred, rejection), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn reject(env: Env, deferred: napi::Deferred, rejection: napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:56:15 [INFO] [stdout] | [INFO] [stdout] 56 | let msg = super::string(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:55:1 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn reject_err_message(env: Env, deferred: napi::Deferred, msg: impl AsRef) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | napi::create_error(env, std::ptr::null_mut(), msg, err.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::promise::reject` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | reject(env, deferred, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:64:27 [INFO] [stdout] | [INFO] [stdout] 64 | reject(env, deferred, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_reference` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | napi::create_reference(env, value, 1, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(env: Env, value: Local) -> napi::Ref { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:16:5 [INFO] [stdout] | [INFO] [stdout] 16 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reference_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:25:9 [INFO] [stdout] | [INFO] [stdout] 25 | napi::reference_ref(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn reference(env: Env, value: napi::Ref) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 29 | result.assume_init() as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reference_unref` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:38:9 [INFO] [stdout] | [INFO] [stdout] 38 | napi::reference_unref(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | pub unsafe fn unreference(env: Env, value: napi::Ref) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:42:8 [INFO] [stdout] | [INFO] [stdout] 42 | if result.assume_init() == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_reference` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:43:20 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(napi::delete_reference(env, value), napi::Status::Ok); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_reference_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:53:9 [INFO] [stdout] | [INFO] [stdout] 53 | napi::get_reference_value(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | pub unsafe fn get(env: Env, value: napi::Ref) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:57:5 [INFO] [stdout] | [INFO] [stdout] 57 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::open_handle_scope` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:18:13 [INFO] [stdout] | [INFO] [stdout] 18 | napi::open_handle_scope(env, scope.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:14:5 [INFO] [stdout] | [INFO] [stdout] 14 | pub(crate) unsafe fn new(env: Env) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:24:20 [INFO] [stdout] | [INFO] [stdout] 24 | scope: scope.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::open_escapable_handle_scope` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:49:13 [INFO] [stdout] | [INFO] [stdout] 49 | napi::open_escapable_handle_scope(env, scope.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:45:5 [INFO] [stdout] | [INFO] [stdout] 45 | pub(crate) unsafe fn new(env: Env) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:55:20 [INFO] [stdout] | [INFO] [stdout] 55 | scope: scope.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::escape_handle` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 63 | napi::escape_handle(self.env, self.scope, value, escapee.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn escape(&self, value: napi::Value) -> napi::Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:67:9 [INFO] [stdout] | [INFO] [stdout] 67 | escapee.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_global` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:82:16 [INFO] [stdout] | [INFO] [stdout] 82 | assert_eq!(super::get_global(env, out as *mut _), napi::Status::Ok); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:81:1 [INFO] [stdout] | [INFO] [stdout] 81 | pub unsafe fn get_global(env: Env, out: &mut Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:9:18 [INFO] [stdout] | [INFO] [stdout] 9 | let status = napi::create_string_utf8(env, data as *const _, len as usize, out); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(out: &mut Local, env: Env, data: *const u8, len: i32) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:16:18 [INFO] [stdout] | [INFO] [stdout] 16 | let status = napi::get_value_string_utf8(env, value, ptr::null_mut(), 0, len.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn utf8_len(env: Env, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | len.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:25:18 [INFO] [stdout] | [INFO] [stdout] 25 | let status = napi::get_value_string_utf8(env, value, out as *mut _, len, read.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn data(env: Env, out: *mut u8, len: usize, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 29 | read.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf16` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | let status = napi::get_value_string_utf16(env, value, ptr::null_mut(), 0, len.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | pub unsafe fn utf16_len(env: Env, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | len.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf16` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:43:18 [INFO] [stdout] | [INFO] [stdout] 43 | let status = napi::get_value_string_utf16(env, value, out, len, read.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | pub unsafe fn data_utf16(env: Env, out: *mut u16, len: usize, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:47:5 [INFO] [stdout] | [INFO] [stdout] 47 | read.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::run_script` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:51:18 [INFO] [stdout] | [INFO] [stdout] 51 | let status = napi::run_script(env, value, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:50:1 [INFO] [stdout] | [INFO] [stdout] 50 | pub unsafe fn run_script(out: &mut Local, env: Env, value: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::typeof_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | napi::typeof_value(env, val, &mut actual as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | unsafe fn is_type(env: Env, val: Local, expect: napi::ValueType) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:17:5 [INFO] [stdout] | [INFO] [stdout] 17 | is_type(env, val, napi::ValueType::Undefined) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | pub unsafe fn is_undefined(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | is_type(env, val, napi::ValueType::Null) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | pub unsafe fn is_null(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:26:5 [INFO] [stdout] | [INFO] [stdout] 26 | is_type(env, val, napi::ValueType::Number) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:25:1 [INFO] [stdout] | [INFO] [stdout] 25 | pub unsafe fn is_number(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:31:5 [INFO] [stdout] | [INFO] [stdout] 31 | is_type(env, val, napi::ValueType::Boolean) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe fn is_boolean(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:36:5 [INFO] [stdout] | [INFO] [stdout] 36 | is_type(env, val, napi::ValueType::String) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | pub unsafe fn is_string(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | is_type(env, val, napi::ValueType::Object) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:39:1 [INFO] [stdout] | [INFO] [stdout] 39 | pub unsafe fn is_object(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_array` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | napi::is_array(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn is_array(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:53:5 [INFO] [stdout] | [INFO] [stdout] 53 | is_type(env, val, napi::ValueType::Function) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn is_function(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:59:9 [INFO] [stdout] | [INFO] [stdout] 59 | napi::is_error(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:56:1 [INFO] [stdout] | [INFO] [stdout] 56 | pub unsafe fn is_error(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_buffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:69:9 [INFO] [stdout] | [INFO] [stdout] 69 | napi::is_buffer(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:66:1 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn is_buffer(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_arraybuffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | napi::is_arraybuffer(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:76:1 [INFO] [stdout] | [INFO] [stdout] 76 | pub unsafe fn is_arraybuffer(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_typedarray` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | napi::is_typedarray(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:86:1 [INFO] [stdout] | [INFO] [stdout] 86 | pub unsafe fn is_typedarray(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::is_date` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:99:9 [INFO] [stdout] | [INFO] [stdout] 99 | napi::is_date(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe fn is_date(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:112:9 [INFO] [stdout] | [INFO] [stdout] 112 | napi::is_promise(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:109:1 [INFO] [stdout] | [INFO] [stdout] 109 | pub unsafe fn is_promise(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:121:9 [INFO] [stdout] | [INFO] [stdout] 121 | napi::type_tag_object(env, object, tag as *const _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | pub unsafe fn type_tag_object(env: Env, object: Local, tag: &super::TypeTag) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::check_object_type_tag` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | napi::check_object_type_tag(env, object, tag as *const _, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | pub unsafe fn check_object_type_tag(env: Env, object: Local, tag: &super::TypeTag) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | is_type(env, val, napi::ValueType::BigInt) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:137:1 [INFO] [stdout] | [INFO] [stdout] 137 | pub unsafe fn is_bigint(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_typedarray_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 28 | / napi::get_typedarray_info( [INFO] [stdout] 29 | | env, [INFO] [stdout] 30 | | value, [INFO] [stdout] 31 | | &mut (*ptr).typ, [INFO] [stdout] ... | [INFO] [stdout] 35 | | &mut (*ptr).offset, [INFO] [stdout] 36 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/typedarray.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn info(env: Env, value: Local) -> TypedArrayInfo { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:31:18 [INFO] [stdout] | [INFO] [stdout] 31 | &mut (*ptr).typ, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:32:18 [INFO] [stdout] | [INFO] [stdout] 32 | &mut (*ptr).length, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:33:18 [INFO] [stdout] | [INFO] [stdout] 33 | &mut (*ptr).data, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | &mut (*ptr).buf, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:35:18 [INFO] [stdout] | [INFO] [stdout] 35 | &mut (*ptr).offset, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | info.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_typedarray` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:51:18 [INFO] [stdout] | [INFO] [stdout] 51 | let status = napi::create_typedarray(env, typ, len, buffer, offset, array.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/typedarray.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | / pub unsafe fn new( [INFO] [stdout] 44 | | env: Env, [INFO] [stdout] 45 | | typ: TypedArrayType, [INFO] [stdout] 46 | | buffer: Local, [INFO] [stdout] 47 | | offset: usize, [INFO] [stdout] 48 | | len: usize, [INFO] [stdout] 49 | | ) -> Result { [INFO] [stdout] | |________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:59:8 [INFO] [stdout] | [INFO] [stdout] 59 | Ok(array.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:424:23 [INFO] [stdout] | [INFO] [stdout] 424 | let get_version = host.get:: Status>(b"napi_get_version")?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/functions.rs:423:1 [INFO] [stdout] | [INFO] [stdout] 423 | unsafe fn get_version(host: &libloading::Library, env: Env) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::get_version` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:440:26 [INFO] [stdout] | [INFO] [stdout] 440 | let actual_version = get_version(&host, env).expect("Failed to find N-API version"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/functions.rs:432:1 [INFO] [stdout] | [INFO] [stdout] 432 | pub(crate) unsafe fn load(env: Env) -> Result<(), libloading::Error> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:457:5 [INFO] [stdout] | [INFO] [stdout] 457 | napi1::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | napi4::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:463:5 [INFO] [stdout] | [INFO] [stdout] 463 | napi5::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:466:5 [INFO] [stdout] | [INFO] [stdout] 466 | napi6::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | napi8::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tsfn::ThreadsafeFunction::::with_capacity` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:47:9 [INFO] [stdout] | [INFO] [stdout] 47 | Self::with_capacity(env, 0, callback) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:46:5 [INFO] [stdout] | [INFO] [stdout] 46 | pub unsafe fn new(env: Env, callback: fn(Option, T)) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::create_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:61:13 [INFO] [stdout] | [INFO] [stdout] 61 | / napi::create_threadsafe_function( [INFO] [stdout] 62 | | env, [INFO] [stdout] 63 | | std::ptr::null_mut(), [INFO] [stdout] 64 | | std::ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 74 | | result.as_mut_ptr(), [INFO] [stdout] 75 | | ), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | / pub unsafe fn with_capacity( [INFO] [stdout] 53 | | env: Env, [INFO] [stdout] 54 | | max_queue_size: usize, [INFO] [stdout] 55 | | callback: fn(Option, T), [INFO] [stdout] 56 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:65:17 [INFO] [stdout] | [INFO] [stdout] 65 | super::string(env, "neon threadsafe function"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:80:24 [INFO] [stdout] | [INFO] [stdout] 80 | tsfn: Tsfn(result.assume_init()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::ref_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:132:13 [INFO] [stdout] | [INFO] [stdout] 132 | napi::ref_threadsafe_function(env, self.tsfn.0), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:130:5 [INFO] [stdout] | [INFO] [stdout] 130 | pub unsafe fn reference(&self, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::unref_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:141:13 [INFO] [stdout] | [INFO] [stdout] 141 | napi::unref_threadsafe_function(env, self.tsfn.0), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:139:5 [INFO] [stdout] | [INFO] [stdout] 139 | pub unsafe fn unref(&self, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:149:28 [INFO] [stdout] | [INFO] [stdout] 149 | let is_finalized = Arc::from_raw(data as *mut Mutex); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | unsafe extern "C" fn finalize(_env: Env, data: *mut c_void, _hint: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:171:44 [INFO] [stdout] | [INFO] [stdout] 171 | let Callback { callback, data } = *Box::from_raw(data as *mut Callback); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | / unsafe extern "C" fn callback( [INFO] [stdout] 166 | | env: Env, [INFO] [stdout] 167 | | _js_callback: napi::Value, [INFO] [stdout] 168 | | _context: *mut c_void, [INFO] [stdout] 169 | | data: *mut c_void, [INFO] [stdout] 170 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::FailureBoundary::catch_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | / BOUNDARY.catch_failure(env, None, move |env| { [INFO] [stdout] 174 | | callback(env, data); [INFO] [stdout] 175 | | ptr::null_mut() [INFO] [stdout] 176 | | }); [INFO] [stdout] | |__________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::create_date` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:15:18 [INFO] [stdout] | [INFO] [stdout] 15 | let status = napi::create_date(env, value, local.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/date.rs:13:1 [INFO] [stdout] | [INFO] [stdout] 13 | pub unsafe fn new_date(env: Env, value: f64) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:17:5 [INFO] [stdout] | [INFO] [stdout] 17 | local.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::get_date_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:28:18 [INFO] [stdout] | [INFO] [stdout] 28 | let status = napi::get_date_value(env, p, &mut value as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/date.rs:26:1 [INFO] [stdout] | [INFO] [stdout] 26 | pub unsafe fn value(env: Env, p: Local) -> f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::set_instance_data` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | napi::set_instance_data(env, data.cast(), Some(drop_box::), ptr::null_mut(),), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | pub unsafe fn set_instance_data(env: Env, data: T) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::get_instance_data` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | napi::get_instance_data(env, data.as_mut_ptr(),), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn get_instance_data(env: Env) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | data.assume_init().cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:45:10 [INFO] [stdout] | [INFO] [stdout] 45 | drop(Box::::from_raw(data.cast())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:44:1 [INFO] [stdout] | [INFO] [stdout] 44 | unsafe extern "C" fn drop_box(_env: Env, data: *mut c_void, _hint: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | / create_string_utf8( [INFO] [stdout] 118 | | env, [INFO] [stdout] 119 | | s.as_bytes().as_ptr() as *const _, [INFO] [stdout] 120 | | s.len(), [INFO] [stdout] 121 | | result.as_mut_ptr(), [INFO] [stdout] 122 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mod.rs:112:1 [INFO] [stdout] | [INFO] [stdout] 112 | unsafe fn string(env: Env, s: impl AsRef) -> raw::Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:126:5 [INFO] [stdout] | [INFO] [stdout] 126 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:139:24 [INFO] [stdout] | [INFO] [stdout] 139 | SETUP.call_once(|| load(env).expect("Failed to load N-API symbols")); [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mod.rs:138:1 [INFO] [stdout] | [INFO] [stdout] 138 | pub unsafe fn setup(env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::external::deref` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/boxed.rs:161:5 [INFO] [stdout] | [INFO] [stdout] 161 | external::deref::(env.to_raw(), local).map(|v| &*v) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/boxed.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | unsafe fn maybe_external_deref<'a>(env: Env, local: raw::Local) -> Option<&'a BoxAny> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/boxed.rs:161:61 [INFO] [stdout] | [INFO] [stdout] 161 | external::deref::(env.to_raw(), local).map(|v| &*v) [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::buffer::uninitialized` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/buffer/types.rs:82:22 [INFO] [stdout] | [INFO] [stdout] 82 | let result = sys::buffer::uninitialized(cx.env().to_raw(), len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/buffer/types.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | pub unsafe fn uninitialized<'a, C: Context<'a>>(cx: &mut C, len: usize) -> JsResult<'a, Self> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `result::Throw::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/buffer/types.rs:87:17 [INFO] [stdout] | [INFO] [stdout] 87 | Err(Throw::new()) [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::promise::reject_err_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/promise.rs:395:9 [INFO] [stdout] | [INFO] [stdout] 395 | / sys::promise::reject_err_message( [INFO] [stdout] 396 | | env, [INFO] [stdout] 397 | | self.0, [INFO] [stdout] 398 | | "`neon::types::Deferred` was dropped without being settled", [INFO] [stdout] 399 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/promise.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | pub(crate) unsafe fn leaked(self, env: raw::Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `InheritedHandleScope` is never constructed [INFO] [stdout] --> src/sys/raw.rs:52:12 [INFO] [stdout] | [INFO] [stdout] 52 | pub struct InheritedHandleScope; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `InheritedHandleScope` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/context/mod.rs:686:23 [INFO] [stdout] | [INFO] [stdout] 686 | let argv = if let Some(argv) = self.arguments.as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^--------------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/context/mod.rs:688:9 [INFO] [stdout] | [INFO] [stdout] 688 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 686 ~ let argv = match self.arguments.as_ref() { Some(argv) => { [INFO] [stdout] 687 | argv [INFO] [stdout] 688 ~ } _ => { [INFO] [stdout] 689 | let argv = self.info.argv(self); [INFO] [stdout] 690 | self.arguments.insert(argv) [INFO] [stdout] 691 ~ }}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/context/internal.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | } else if let Ok(result) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/context/internal.rs:43:9 [INFO] [stdout] | [INFO] [stdout] 43 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 41 ~ } else { match result { Ok(result) => { [INFO] [stdout] 42 | Ok(result) [INFO] [stdout] 43 ~ } _ => { [INFO] [stdout] 44 | panic!("try_catch: unexpected Err(Throw) when VM is not in a throwing state"); [INFO] [stdout] 45 ~ }}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/sys/no_panic.rs:224:8 [INFO] [stdout] | [INFO] [stdout] 224 | if let Some(msg) = panic_msg(&panic) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^-----^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/sys/no_panic.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 224 ~ match panic_msg(&panic) { Some(msg) => { [INFO] [stdout] 225 | error_from_message(env, msg) [INFO] [stdout] 226 ~ } _ => { [INFO] [stdout] 227 | let error = error_from_message(env, UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] ... [INFO] [stdout] 231 | error [INFO] [stdout] 232 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/mod.rs:1148:16 [INFO] [stdout] | [INFO] [stdout] 1148 | if let Ok(raw) = sys::fun::new(cx.env().to_raw(), name, f) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^-^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/mod.rs:1150:13 [INFO] [stdout] | [INFO] [stdout] 1150 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 1148 ~ match sys::fun::new(cx.env().to_raw(), name, f) { Ok(raw) => { [INFO] [stdout] 1149 | Ok(Handle::new_internal(JsFunction { raw })) [INFO] [stdout] 1150 ~ } _ => { [INFO] [stdout] 1151 | Err(Throw::new()) [INFO] [stdout] 1152 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:395:12 [INFO] [stdout] | [INFO] [stdout] 395 | if let Some(v) = self { [INFO] [stdout] | ^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:397:9 [INFO] [stdout] | [INFO] [stdout] 397 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 395 ~ match self { Some(v) => { [INFO] [stdout] 396 | v.finalize(cx); [INFO] [stdout] 397 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:403:12 [INFO] [stdout] | [INFO] [stdout] 403 | if let Ok(v) = std::rc::Rc::try_unwrap(self) { [INFO] [stdout] | ^^^^^^^^^^^^----------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:405:9 [INFO] [stdout] | [INFO] [stdout] 405 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 403 ~ match std::rc::Rc::try_unwrap(self) { Ok(v) => { [INFO] [stdout] 404 | v.finalize(cx); [INFO] [stdout] 405 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:411:12 [INFO] [stdout] | [INFO] [stdout] 411 | if let Ok(v) = std::sync::Arc::try_unwrap(self) { [INFO] [stdout] | ^^^^^^^^^^^^-------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:413:9 [INFO] [stdout] | [INFO] [stdout] 413 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 411 ~ match std::sync::Arc::try_unwrap(self) { Ok(v) => { [INFO] [stdout] 412 | v.finalize(cx); [INFO] [stdout] 413 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:419:12 [INFO] [stdout] | [INFO] [stdout] 419 | if let Ok(v) = self.into_inner() { [INFO] [stdout] | ^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:421:9 [INFO] [stdout] | [INFO] [stdout] 421 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 419 ~ match self.into_inner() { Ok(v) => { [INFO] [stdout] 420 | v.finalize(cx); [INFO] [stdout] 421 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:427:12 [INFO] [stdout] | [INFO] [stdout] 427 | if let Ok(v) = self.into_inner() { [INFO] [stdout] | ^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:429:9 [INFO] [stdout] | [INFO] [stdout] 429 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 427 ~ match self.into_inner() { Ok(v) => { [INFO] [stdout] 428 | v.finalize(cx); [INFO] [stdout] 429 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:123:26 [INFO] [stdout] | [INFO] [stdout] 123 | let msg = if let Some(string) = panic.downcast_ref::() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^-----^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] 124 | format!("internal error in Neon module: {}", string) [INFO] [stdout] 125 | } else if let Some(str) = panic.downcast_ref::<&str>() { [INFO] [stdout] | ----- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | } else if let Some(str) = panic.downcast_ref::<&str>() { [INFO] [stdout] | ^ [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:127:13 [INFO] [stdout] | [INFO] [stdout] 127 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 123 ~ let msg = match panic.downcast_ref::() { Some(string) => { [INFO] [stdout] 124 | format!("internal error in Neon module: {}", string) [INFO] [stdout] 125 ~ } _ => { match panic.downcast_ref::<&str>() { Some(str) => { [INFO] [stdout] 126 | format!("internal error in Neon module: {}", str) [INFO] [stdout] 127 ~ } _ => { [INFO] [stdout] 128 | "internal error in Neon module".to_string() [INFO] [stdout] 129 ~ }}}}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/extract/mod.rs:219:12 [INFO] [stdout] | [INFO] [stdout] 219 | if let Some((v,)) = private::FromArgsInternal::from_args_opt(cx)? { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^--------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/extract/mod.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 219 ~ match private::FromArgsInternal::from_args_opt(cx)? { Some((v,)) => { [INFO] [stdout] 220 | Ok(Some(v)) [INFO] [stdout] 221 ~ } _ => { [INFO] [stdout] 222 | Ok(None) [INFO] [stdout] 223 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/extract/try_into_js.rs:70:12 [INFO] [stdout] | [INFO] [stdout] 70 | if let Some(val) = self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/extract/try_into_js.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 70 ~ match self { Some(val) => { [INFO] [stdout] 71 | val.try_into_js(cx).map(|v| v.upcast()) [INFO] [stdout] 72 ~ } _ => { [INFO] [stdout] 73 | Ok(cx.undefined().upcast()) [INFO] [stdout] 74 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 295 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `neon` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/context/mod.rs [INFO] [stderr] * src/lifecycle.rs [INFO] [stderr] * src/types_impl/buffer/types.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/context/internal.rs:69:3 [INFO] [stdout] | [INFO] [stdout] 69 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 69 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/types_impl/buffer/types.rs:25:6 [INFO] [stderr] | [INFO] [stderr] 25 | {$comment:expr_2021, $decl:item} => { $decl }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/types_impl/buffer/types.rs:782:79 [INFO] [stderr] | [INFO] [stderr] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr_2021$(,)?) => { [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/context/mod.rs:264:38 [INFO] [stderr] | [INFO] [stderr] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stderr] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stderr] | | [INFO] [stderr] | lifetime `'b` declared here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/context/mod.rs:536:65 [INFO] [stderr] | [INFO] [stderr] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stderr] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:105:71 [INFO] [stderr] | [INFO] [stderr] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stderr] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:116:81 [INFO] [stderr] | [INFO] [stderr] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stderr] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] warning: elided lifetime has a name [INFO] [stderr] --> src/lifecycle.rs:132:17 [INFO] [stderr] | [INFO] [stderr] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stderr] | -- lifetime `'a` declared here [INFO] [stderr] ... [INFO] [stderr] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stderr] | ^ this elided lifetime gets resolved as `'a` [INFO] [stderr] [INFO] [stderr] error: aborting due to 2 previous errors; 5 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:264:38 [INFO] [stdout] | [INFO] [stdout] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stdout] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stdout] | | [INFO] [stdout] | lifetime `'b` declared here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:536:65 [INFO] [stdout] | [INFO] [stdout] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stdout] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/types_impl/buffer/types.rs:25:15 [INFO] [stdout] | [INFO] [stdout] 25 | {$comment:expr, $decl:item} => { $decl }; [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 25 | {$comment:expr_2021, $decl:item} => { $decl }; [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/types_impl/buffer/types.rs:782:84 [INFO] [stdout] | [INFO] [stdout] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr$(,)?) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 782 | ($typ:ident, $etyp:ty, $($pattern:pat_param)|+, $tag:ident, $alias:ident, $two:expr_2021$(,)?) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:105:71 [INFO] [stdout] | [INFO] [stdout] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:116:81 [INFO] [stdout] | [INFO] [stdout] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stdout] | ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::catch_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | if sys::error::catch_error(self.to_raw(), local.as_mut_ptr()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | / pub(super) unsafe fn try_catch(self, f: F) -> Result [INFO] [stdout] 33 | | where [INFO] [stdout] 34 | | F: FnOnce() -> Result, [INFO] [stdout] | |_______________________________________________________^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:40:17 [INFO] [stdout] | [INFO] [stdout] 40 | Err(local.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::setup` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | sys::setup(env); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:70:1 [INFO] [stdout] | [INFO] [stdout] 70 | unsafe extern "C" fn napi_register_module_v1(env: *mut c_void, m: *mut c_void) -> *mut c_void { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types_impl::private::ValueInternal::from_local` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:80:40 [INFO] [stdout] | [INFO] [stdout] 80 | let exports = Handle::new_internal(JsObject::from_local(env, m.cast())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::reference::unreference` is unsafe and requires unsafe block [INFO] [stdout] --> src/handle/root.rs:34:9 [INFO] [stdout] | [INFO] [stdout] 34 | reference::unreference(env, self.0.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/handle/root.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | pub(crate) unsafe fn unref(self, env: raw::Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | sys::object::get_index(out, cx.env().to_raw(), obj, self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:65:5 [INFO] [stdout] | [INFO] [stdout] 65 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 66 | | self, [INFO] [stdout] 67 | | cx: &mut C, [INFO] [stdout] 68 | | out: &mut raw::Local, [INFO] [stdout] 69 | | obj: raw::Local, [INFO] [stdout] 70 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:81:9 [INFO] [stdout] | [INFO] [stdout] 81 | sys::object::set_index(out, cx.env().to_raw(), obj, self, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 75 | | self, [INFO] [stdout] 76 | | cx: &mut C, [INFO] [stdout] 77 | | out: &mut bool, [INFO] [stdout] 78 | | obj: raw::Local, [INFO] [stdout] 79 | | val: raw::Local, [INFO] [stdout] 80 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:94:9 [INFO] [stdout] | [INFO] [stdout] 94 | sys::object::get(out, env, obj, self.to_local()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 87 | | self, [INFO] [stdout] 88 | | cx: &mut C, [INFO] [stdout] 89 | | out: &mut raw::Local, [INFO] [stdout] 90 | | obj: raw::Local, [INFO] [stdout] 91 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | sys::object::set(out, env, obj, self.to_local(), val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 98 | | self, [INFO] [stdout] 99 | | cx: &mut C, [INFO] [stdout] 100 | | out: &mut bool, [INFO] [stdout] 101 | | obj: raw::Local, [INFO] [stdout] 102 | | val: raw::Local, [INFO] [stdout] 103 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:120:9 [INFO] [stdout] | [INFO] [stdout] 120 | sys::object::get_string(env, out, obj, ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:111:5 [INFO] [stdout] | [INFO] [stdout] 111 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 112 | | self, [INFO] [stdout] 113 | | cx: &mut C, [INFO] [stdout] 114 | | out: &mut raw::Local, [INFO] [stdout] 115 | | obj: raw::Local, [INFO] [stdout] 116 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | sys::object::set_string(env, out, obj, ptr, len, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 124 | | self, [INFO] [stdout] 125 | | cx: &mut C, [INFO] [stdout] 126 | | out: &mut bool, [INFO] [stdout] 127 | | obj: raw::Local, [INFO] [stdout] 128 | | val: raw::Local, [INFO] [stdout] 129 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_array_with_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | napi::create_array_with_length(env, length, out as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(out: &mut Local, env: Env, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_array_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:23:9 [INFO] [stdout] | [INFO] [stdout] 23 | napi::get_array_length(env, array, &mut len as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | pub unsafe fn len(env: Env, array: Local) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_arraybuffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:12:18 [INFO] [stdout] | [INFO] [stdout] 12 | let status = napi::create_arraybuffer(env, len, null_mut(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | Ok(buf.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:57:1 [INFO] [stdout] | [INFO] [stdout] 57 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:31 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:80:9 [INFO] [stdout] | [INFO] [stdout] 80 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:75:1 [INFO] [stdout] | [INFO] [stdout] 75 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | / napi::create_async_work( [INFO] [stdout] 63 | | env, [INFO] [stdout] 64 | | ptr::null_mut(), [INFO] [stdout] 65 | | super::string(env, "neon_async_work"), [INFO] [stdout] ... | [INFO] [stdout] 69 | | work, [INFO] [stdout] 70 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | / pub unsafe fn schedule( [INFO] [stdout] 37 | | env: Env, [INFO] [stdout] 38 | | input: I, [INFO] [stdout] 39 | | execute: Execute, [INFO] [stdout] ... | [INFO] [stdout] 44 | | O: Send + 'static, [INFO] [stdout] 45 | | D: 'static, [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:65:13 [INFO] [stdout] | [INFO] [stdout] 65 | super::string(env, "neon_async_work"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::queue_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:11 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:39 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:13 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:42 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:128:21 [INFO] [stdout] | [INFO] [stdout] 128 | let data = &mut *data.cast::>(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | unsafe extern "C" fn call_execute(_: Env, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:153:10 [INFO] [stdout] | [INFO] [stdout] 153 | } = *Box::>::from_raw(data.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | unsafe extern "C" fn call_complete(env: Env, status: napi::Status, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:155:5 [INFO] [stdout] | [INFO] [stdout] 155 | napi::delete_async_work(env, work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::FailureBoundary::catch_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:157:5 [INFO] [stdout] | [INFO] [stdout] 157 | / BOUNDARY.catch_failure(env, None, move |env| { [INFO] [stdout] 158 | | // `unwrap` is okay because `call_complete` should be called exactly once [INFO] [stdout] 159 | | // if and only if `call_execute` has completed successfully [INFO] [stdout] 160 | | let output = state.into_output().unwrap(); [INFO] [stdout] ... | [INFO] [stdout] 180 | | ptr::null_mut() [INFO] [stdout] 181 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::buffer::uninitialized` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:11:24 [INFO] [stdout] | [INFO] [stdout] 11 | let (buf, bytes) = uninitialized(env, len)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | std::ptr::write_bytes(bytes, 0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_buffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:21:18 [INFO] [stdout] | [INFO] [stdout] 21 | let status = napi::create_buffer(env, len, bytes.as_mut_ptr(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | pub unsafe fn uninitialized(env: Env, len: usize) -> Result<(Local, *mut u8), napi::Status> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:28 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:66:1 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:31 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:84:1 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_new_target` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:36:18 [INFO] [stdout] | [INFO] [stdout] 36 | let status = napi::get_new_target(env, info, target.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn is_construct(env: Env, info: FunctionCallbackInfo) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:41:25 [INFO] [stdout] | [INFO] [stdout] 41 | let target: Local = target.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:50:18 [INFO] [stdout] | [INFO] [stdout] 50 | let status = napi::get_cb_info(env, info, null_mut(), null_mut(), out as *mut _, null_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | pub unsafe fn this(env: Env, info: FunctionCallbackInfo, out: &mut Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:58:18 [INFO] [stdout] | [INFO] [stdout] 58 | let status = napi::get_cb_info( [INFO] [stdout] | __________________^ [INFO] [stdout] 59 | | env, [INFO] [stdout] 60 | | info, [INFO] [stdout] 61 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 64 | | null_mut(), [INFO] [stdout] 65 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:56:1 [INFO] [stdout] | [INFO] [stdout] 56 | pub unsafe fn len(env: Env, info: FunctionCallbackInfo) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | / napi::get_cb_info( [INFO] [stdout] 80 | | env, [INFO] [stdout] 81 | | info, [INFO] [stdout] 82 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 85 | | null_mut(), [INFO] [stdout] 86 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | pub unsafe fn argv(env: Env, info: FunctionCallbackInfo) -> Arguments { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:96:13 [INFO] [stdout] | [INFO] [stdout] 96 | / napi::get_cb_info( [INFO] [stdout] 97 | | env, [INFO] [stdout] 98 | | info, [INFO] [stdout] 99 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 102 | | null_mut(), [INFO] [stdout] 103 | | ), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:108:9 [INFO] [stdout] | [INFO] [stdout] 108 | argv.set_len(argc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:113:36 [INFO] [stdout] | [INFO] [stdout] 113 | SmallVec::from_buf_and_len(argv.assume_init(), argc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::coerce_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/convert.rs:7:18 [INFO] [stdout] | [INFO] [stdout] 7 | let status = napi::coerce_to_string(env, value, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/convert.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | pub unsafe fn to_string(out: &mut Local, env: Env, value: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:11:18 [INFO] [stdout] | [INFO] [stdout] 11 | let status = napi::is_exception_pending(env, b.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn is_throwing(env: Env) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | b.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::is_throwing` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:19:9 [INFO] [stdout] | [INFO] [stdout] 19 | if !is_throwing(env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | pub unsafe fn catch_error(env: Env, error: *mut Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | let status = napi::get_and_clear_last_exception(env, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:32:18 [INFO] [stdout] | [INFO] [stdout] 32 | let status = napi::is_exception_pending(env, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe fn clear_exception(env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:36:9 [INFO] [stdout] | [INFO] [stdout] 36 | if !result.assume_init() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:41:18 [INFO] [stdout] | [INFO] [stdout] 41 | let status = napi::get_and_clear_last_exception(env, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::throw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:47:18 [INFO] [stdout] | [INFO] [stdout] 47 | let status = napi::throw(env, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:46:1 [INFO] [stdout] | [INFO] [stdout] 46 | pub unsafe fn throw(env: Env, val: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:54:18 [INFO] [stdout] | [INFO] [stdout] 54 | let status = napi::create_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn new_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:58:12 [INFO] [stdout] | [INFO] [stdout] 58 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_type_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:63:18 [INFO] [stdout] | [INFO] [stdout] 63 | let status = napi::create_type_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:61:1 [INFO] [stdout] | [INFO] [stdout] 61 | pub unsafe fn new_type_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:67:12 [INFO] [stdout] | [INFO] [stdout] 67 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_range_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:72:18 [INFO] [stdout] | [INFO] [stdout] 72 | let status = napi::create_range_error(env, ptr::null_mut(), msg, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:70:1 [INFO] [stdout] | [INFO] [stdout] 70 | pub unsafe fn new_range_error(env: Env, out: &mut Local, msg: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:76:12 [INFO] [stdout] | [INFO] [stdout] 76 | *out = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:81:18 [INFO] [stdout] | [INFO] [stdout] 81 | let status = napi::create_string_utf8(env, msg as *const _, len as usize, out.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:79:1 [INFO] [stdout] | [INFO] [stdout] 79 | pub unsafe fn throw_error_from_utf8(env: Env, msg: *const u8, len: i32) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:86:18 [INFO] [stdout] | [INFO] [stdout] 86 | let status = napi::create_error(env, ptr::null_mut(), out.assume_init(), err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:86:59 [INFO] [stdout] | [INFO] [stdout] 86 | let status = napi::create_error(env, ptr::null_mut(), out.assume_init(), err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::throw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:90:5 [INFO] [stdout] | [INFO] [stdout] 90 | throw(env, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:90:16 [INFO] [stdout] | [INFO] [stdout] 90 | throw(env, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | / napi::fatal_error( [INFO] [stdout] 98 | | location.as_ptr().cast(), [INFO] [stdout] 99 | | location.len(), [INFO] [stdout] 100 | | message.as_ptr().cast(), [INFO] [stdout] 101 | | message.len(), [INFO] [stdout] 102 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:94:1 [INFO] [stdout] | [INFO] [stdout] 94 | pub(super) unsafe fn fatal_error(message: &str) -> ! { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::typeof_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:33:18 [INFO] [stdout] | [INFO] [stdout] 33 | let status = napi::typeof_value(env, local, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/external.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn deref(env: Env, local: Local) -> Option<*const T> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:37:18 [INFO] [stdout] | [INFO] [stdout] 37 | let result = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::check_object_type_tag` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:48:9 [INFO] [stdout] | [INFO] [stdout] 48 | if !super::tag::check_object_type_tag(env, local, &crate::MODULE_TAG) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:53:18 [INFO] [stdout] | [INFO] [stdout] 53 | let status = napi::get_value_external(env, local, result.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:57:13 [INFO] [stdout] | [INFO] [stdout] 57 | let v = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:58:15 [INFO] [stdout] | [INFO] [stdout] 58 | let v = &**v.cast_const().cast::>() as *const T; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:68:18 [INFO] [stdout] | [INFO] [stdout] 68 | let status = napi::create_external( [INFO] [stdout] | __________________^ [INFO] [stdout] 69 | | env, [INFO] [stdout] 70 | | Box::into_raw(v) as *mut _, [INFO] [stdout] 71 | | Some(finalize_external::), [INFO] [stdout] ... | [INFO] [stdout] 75 | | result.as_mut_ptr(), [INFO] [stdout] 76 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/external.rs:64:1 [INFO] [stdout] | [INFO] [stdout] 64 | pub unsafe fn create(env: Env, v: T, finalizer: fn(Env, T)) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:82:20 [INFO] [stdout] | [INFO] [stdout] 82 | let external = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/external.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | super::tag::type_tag_object(env, external, &crate::MODULE_TAG); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:16:18 [INFO] [stdout] | [INFO] [stdout] 16 | let status = napi::create_function( [INFO] [stdout] | __________________^ [INFO] [stdout] 17 | | env, [INFO] [stdout] 18 | | name.as_ptr().cast(), [INFO] [stdout] 19 | | name.len(), [INFO] [stdout] ... | [INFO] [stdout] 22 | | out.as_mut_ptr(), [INFO] [stdout] 23 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | / pub unsafe fn new(env: Env, name: &str, callback: F) -> Result [INFO] [stdout] 11 | | where [INFO] [stdout] 12 | | F: Fn(Env, napi::CallbackInfo) -> Local + 'static, [INFO] [stdout] | |______________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:26:14 [INFO] [stdout] | [INFO] [stdout] 26 | drop(Box::from_raw(data)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:33:15 [INFO] [stdout] | [INFO] [stdout] 33 | let out = out.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::add_finalizer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:45:22 [INFO] [stdout] | [INFO] [stdout] 45 | let status = napi::add_finalizer( [INFO] [stdout] | ______________________^ [INFO] [stdout] 46 | | env, [INFO] [stdout] 47 | | out, [INFO] [stdout] 48 | | ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 51 | | ptr::null_mut(), [INFO] [stdout] 52 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:42:18 [INFO] [stdout] | [INFO] [stdout] 42 | drop(Box::from_raw(finalize_hint.cast::())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | / unsafe extern "C" fn drop_function( [INFO] [stdout] 38 | | _env: Env, [INFO] [stdout] 39 | | _finalize_data: *mut c_void, [INFO] [stdout] 40 | | finalize_hint: *mut c_void, [INFO] [stdout] 41 | | ) { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:70:18 [INFO] [stdout] | [INFO] [stdout] 70 | let status = napi::get_cb_info( [INFO] [stdout] | __________________^ [INFO] [stdout] 71 | | env, [INFO] [stdout] 72 | | info, [INFO] [stdout] 73 | | ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 76 | | data.as_mut_ptr(), [INFO] [stdout] 77 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:65:1 [INFO] [stdout] | [INFO] [stdout] 65 | / unsafe extern "C" fn call_boxed(env: Env, info: napi::CallbackInfo) -> Local [INFO] [stdout] 66 | | where [INFO] [stdout] 67 | | F: Fn(Env, napi::CallbackInfo) -> Local + 'static, [INFO] [stdout] | |______________________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:81:21 [INFO] [stdout] | [INFO] [stdout] 81 | let callback = &*data.assume_init().cast::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:81:22 [INFO] [stdout] | [INFO] [stdout] 81 | let callback = &*data.assume_init().cast::(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::call_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:94:18 [INFO] [stdout] | [INFO] [stdout] 94 | let status = napi::call_function( [INFO] [stdout] | __________________^ [INFO] [stdout] 95 | | env, [INFO] [stdout] 96 | | this, [INFO] [stdout] 97 | | fun, [INFO] [stdout] ... | [INFO] [stdout] 100 | | out as *mut _, [INFO] [stdout] 101 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:86:1 [INFO] [stdout] | [INFO] [stdout] 86 | / pub unsafe fn call( [INFO] [stdout] 87 | | out: &mut Local, [INFO] [stdout] 88 | | env: Env, [INFO] [stdout] 89 | | fun: Local, [INFO] [stdout] ... | [INFO] [stdout] 92 | | argv: *const c_void, [INFO] [stdout] 93 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::new_instance` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/fun.rs:113:18 [INFO] [stdout] | [INFO] [stdout] 113 | let status = napi::new_instance(env, fun, argc as usize, argv as *const _, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/fun.rs:106:1 [INFO] [stdout] | [INFO] [stdout] 106 | / pub unsafe fn construct( [INFO] [stdout] 107 | | out: &mut Local, [INFO] [stdout] 108 | | env: Env, [INFO] [stdout] 109 | | fun: Local, [INFO] [stdout] 110 | | argc: i32, [INFO] [stdout] 111 | | argv: *const c_void, [INFO] [stdout] 112 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::strict_equals` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mem.rs:9:9 [INFO] [stdout] | [INFO] [stdout] 9 | napi::strict_equals(env, lhs, rhs, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mem.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | pub unsafe fn strict_equals(env: Env, lhs: Local, rhs: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::panic_msg` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:68:27 [INFO] [stdout] | [INFO] [stdout] 68 | let msg = panic_msg(&panic).unwrap_or(UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:50:5 [INFO] [stdout] | [INFO] [stdout] 50 | / pub unsafe fn catch_failure(&self, env: Env, deferred: Option, f: F) [INFO] [stdout] 51 | | where [INFO] [stdout] 52 | | F: FnOnce(Option) -> Local, [INFO] [stdout] | |________________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:70:17 [INFO] [stdout] | [INFO] [stdout] 70 | fatal_error(msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::catch_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:78:25 [INFO] [stdout] | [INFO] [stdout] 78 | let exception = catch_exception(env); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:89:21 [INFO] [stdout] | [INFO] [stdout] 89 | reject_deferred(env, deferred, err); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:103:21 [INFO] [stdout] | [INFO] [stdout] 103 | resolve_deferred(env, deferred, *value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:112:25 [INFO] [stdout] | [INFO] [stdout] 112 | let error = create_error(env, msg, exception, panic.err()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:114:13 [INFO] [stdout] | [INFO] [stdout] 114 | reject_deferred(env, deferred, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:119:21 [INFO] [stdout] | [INFO] [stdout] 119 | let error = create_error(env, msg, exception, panic.err()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::fatal_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:122:9 [INFO] [stdout] | [INFO] [stdout] 122 | fatal_exception(env, error); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:146:26 [INFO] [stdout] | [INFO] [stdout] 146 | let deferred = match napi::create_promise(env, deferred.as_mut_ptr(), promise.as_mut_ptr()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:142:1 [INFO] [stdout] | [INFO] [stdout] 142 | unsafe fn fatal_exception(env: Env, error: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:147:29 [INFO] [stdout] | [INFO] [stdout] 147 | napi::Status::Ok => deferred.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:148:14 [INFO] [stdout] | [INFO] [stdout] 148 | _ => fatal_error("Failed to create a promise"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:151:8 [INFO] [stdout] | [INFO] [stdout] 151 | if napi::reject_deferred(env, deferred, error) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:152:9 [INFO] [stdout] | [INFO] [stdout] 152 | fatal_error("Failed to reject a promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:164:17 [INFO] [stdout] | [INFO] [stdout] 164 | let error = error_from_message(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:157:1 [INFO] [stdout] | [INFO] [stdout] 157 | / unsafe fn create_error( [INFO] [stdout] 158 | | env: Env, [INFO] [stdout] 159 | | msg: &str, [INFO] [stdout] 160 | | exception: Option, [INFO] [stdout] 161 | | panic: Option, [INFO] [stdout] 162 | | ) -> Local { [INFO] [stdout] | |__________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:168:9 [INFO] [stdout] | [INFO] [stdout] 168 | set_property(env, error, "cause", exception); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | set_property(env, error, "panic", error_from_panic(env, panic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_panic` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:173:43 [INFO] [stdout] | [INFO] [stdout] 173 | set_property(env, error, "panic", error_from_panic(env, panic)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:181:8 [INFO] [stdout] | [INFO] [stdout] 181 | if napi::resolve_deferred(env, deferred, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:180:1 [INFO] [stdout] | [INFO] [stdout] 180 | unsafe fn resolve_deferred(env: Env, deferred: napi::Deferred, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:182:9 [INFO] [stdout] | [INFO] [stdout] 182 | fatal_error("Failed to resolve promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:188:8 [INFO] [stdout] | [INFO] [stdout] 188 | if napi::reject_deferred(env, deferred, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:187:1 [INFO] [stdout] | [INFO] [stdout] 187 | unsafe fn reject_deferred(env: Env, deferred: napi::Deferred, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:189:9 [INFO] [stdout] | [INFO] [stdout] 189 | fatal_error("Failed to reject promise"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:195:9 [INFO] [stdout] | [INFO] [stdout] 195 | if !is_exception_pending(env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:194:1 [INFO] [stdout] | [INFO] [stdout] 194 | unsafe fn catch_exception(env: Env) -> Option { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_and_clear_last_exception` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:201:8 [INFO] [stdout] | [INFO] [stdout] 201 | if napi::get_and_clear_last_exception(env, error.as_mut_ptr()) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:202:9 [INFO] [stdout] | [INFO] [stdout] 202 | fatal_error("Failed to get and clear the last exception"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:205:10 [INFO] [stdout] | [INFO] [stdout] 205 | Some(error.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:210:15 [INFO] [stdout] | [INFO] [stdout] 210 | let msg = create_string(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:209:1 [INFO] [stdout] | [INFO] [stdout] 209 | unsafe fn error_from_message(env: Env, msg: &str) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:213:18 [INFO] [stdout] | [INFO] [stdout] 213 | let status = napi::create_error(env, ptr::null_mut(), msg, err.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | err.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:218:9 [INFO] [stdout] | [INFO] [stdout] 218 | fatal_error("Failed to create an Error"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::panic_msg` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:224:24 [INFO] [stdout] | [INFO] [stdout] 224 | if let Some(msg) = panic_msg(&panic) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:223:1 [INFO] [stdout] | [INFO] [stdout] 223 | unsafe fn error_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:225:9 [INFO] [stdout] | [INFO] [stdout] 225 | error_from_message(env, msg) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::error_from_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:227:21 [INFO] [stdout] | [INFO] [stdout] 227 | let error = error_from_message(env, UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::external_from_panic` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:228:21 [INFO] [stdout] | [INFO] [stdout] 228 | let panic = external_from_panic(env, panic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:230:9 [INFO] [stdout] | [INFO] [stdout] 230 | set_property(env, error, "cause", panic); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::create_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:237:15 [INFO] [stdout] | [INFO] [stdout] 237 | let key = create_string(env, key); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:236:1 [INFO] [stdout] | [INFO] [stdout] 236 | unsafe fn set_property(env: Env, object: Local, key: &str, value: Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:239:8 [INFO] [stdout] | [INFO] [stdout] 239 | if napi::set_property(env, object, key, value) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:240:9 [INFO] [stdout] | [INFO] [stdout] 240 | fatal_error("Failed to set an object property"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:256:19 [INFO] [stdout] | [INFO] [stdout] 256 | let fail = || fatal_error("Failed to create a neon::types::JsBox from a panic"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:255:1 [INFO] [stdout] | [INFO] [stdout] 255 | unsafe fn external_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_external` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:258:18 [INFO] [stdout] | [INFO] [stdout] 258 | let status = napi::create_external( [INFO] [stdout] | __________________^ [INFO] [stdout] 259 | | env, [INFO] [stdout] 260 | | Box::into_raw(Box::new(DebugSendWrapper::new(panic))).cast(), [INFO] [stdout] 261 | | Some(finalize_panic), [INFO] [stdout] 262 | | ptr::null_mut(), [INFO] [stdout] 263 | | result.as_mut_ptr(), [INFO] [stdout] 264 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:255:1 [INFO] [stdout] | [INFO] [stdout] 255 | unsafe fn external_from_panic(env: Env, panic: Panic) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:270:20 [INFO] [stdout] | [INFO] [stdout] 270 | let external = result.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:273:8 [INFO] [stdout] | [INFO] [stdout] 273 | if napi::type_tag_object(env, external, &*crate::MODULE_TAG) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:289:18 [INFO] [stdout] | [INFO] [stdout] 289 | let status = napi::create_string_utf8(env, msg.as_ptr().cast(), msg.len(), string.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:287:1 [INFO] [stdout] | [INFO] [stdout] 287 | unsafe fn create_string(env: Env, msg: &str) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:292:9 [INFO] [stdout] | [INFO] [stdout] 292 | fatal_error("Failed to create a String"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:295:5 [INFO] [stdout] | [INFO] [stdout] 295 | string.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:301:8 [INFO] [stdout] | [INFO] [stdout] 301 | if napi::is_exception_pending(env, &mut throwing) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/no_panic.rs:298:1 [INFO] [stdout] | [INFO] [stdout] 298 | unsafe fn is_exception_pending(env: Env) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::fatal_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/no_panic.rs:302:9 [INFO] [stdout] | [INFO] [stdout] 302 | fatal_error("Failed to check if an exception is pending"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:10:5 [INFO] [stdout] | [INFO] [stdout] 10 | napi::create_object(env, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:9:1 [INFO] [stdout] | [INFO] [stdout] 9 | pub unsafe fn new(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::object_freeze` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:15:18 [INFO] [stdout] | [INFO] [stdout] 15 | let status = napi::object_freeze(env, obj); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn freeze(env: Env, obj: Local) -> napi::Status { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::object_seal` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:25:5 [INFO] [stdout] | [INFO] [stdout] 25 | napi::object_seal(env, obj) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:24:1 [INFO] [stdout] | [INFO] [stdout] 24 | pub unsafe fn seal(env: Env, obj: Local) -> napi::Status { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::get_all_property_names` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:34:8 [INFO] [stdout] | [INFO] [stdout] 34 | if napi::get_all_property_names( [INFO] [stdout] | ________^ [INFO] [stdout] 35 | | env, [INFO] [stdout] 36 | | object, [INFO] [stdout] 37 | | napi::KeyCollectionMode::OwnOnly, [INFO] [stdout] ... | [INFO] [stdout] 40 | | property_names.as_mut_ptr(), [INFO] [stdout] 41 | | ) != napi::Status::Ok [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn get_own_property_names(out: &mut Local, env: Env, object: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:46:12 [INFO] [stdout] | [INFO] [stdout] 46 | *out = property_names.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_element` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:53:18 [INFO] [stdout] | [INFO] [stdout] 53 | let status = napi::get_element(env, object, index, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn get_index(out: &mut Local, env: Env, object: Local, index: u32) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_element` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:66:18 [INFO] [stdout] | [INFO] [stdout] 66 | let status = napi::set_element(env, object, index, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:65:1 [INFO] [stdout] | [INFO] [stdout] 65 | pub unsafe fn set_index(out: &mut bool, env: Env, object: Local, index: u32, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:84:8 [INFO] [stdout] | [INFO] [stdout] 84 | if napi::create_string_utf8(env, key as *const _, len as usize, key_val.as_mut_ptr()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:73:1 [INFO] [stdout] | [INFO] [stdout] 73 | / pub unsafe fn get_string( [INFO] [stdout] 74 | | env: Env, [INFO] [stdout] 75 | | out: &mut Local, [INFO] [stdout] 76 | | object: Local, [INFO] [stdout] 77 | | key: *const u8, [INFO] [stdout] 78 | | len: i32, [INFO] [stdout] 79 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:91:8 [INFO] [stdout] | [INFO] [stdout] 91 | if napi::get_property(env, object, key_val.assume_init(), out as *mut _) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:91:40 [INFO] [stdout] | [INFO] [stdout] 91 | if napi::get_property(env, object, key_val.assume_init(), out as *mut _) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:116:8 [INFO] [stdout] | [INFO] [stdout] 116 | if napi::create_string_utf8(env, key as *const _, len as usize, key_val.as_mut_ptr()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe fn set_string( [INFO] [stdout] 105 | | env: Env, [INFO] [stdout] 106 | | out: &mut bool, [INFO] [stdout] 107 | | object: Local, [INFO] [stdout] ... | [INFO] [stdout] 110 | | val: Local, [INFO] [stdout] 111 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:123:8 [INFO] [stdout] | [INFO] [stdout] 123 | if napi::set_property(env, object, key_val.assume_init(), val) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:123:40 [INFO] [stdout] | [INFO] [stdout] 123 | if napi::set_property(env, object, key_val.assume_init(), val) != napi::Status::Ok { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:134:18 [INFO] [stdout] | [INFO] [stdout] 134 | let status = napi::get_property(env, object, key, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:133:1 [INFO] [stdout] | [INFO] [stdout] 133 | pub unsafe fn get(out: &mut Local, env: Env, object: Local, key: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::set_property` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/object.rs:146:18 [INFO] [stdout] | [INFO] [stdout] 146 | let status = napi::set_property(env, object, key, val); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/object.rs:145:1 [INFO] [stdout] | [INFO] [stdout] 145 | pub unsafe fn set(out: &mut bool, env: Env, object: Local, key: Local, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_undefined` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:8:5 [INFO] [stdout] | [INFO] [stdout] 8 | napi::get_undefined(env, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | pub unsafe fn undefined(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_null` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | napi::get_null(env, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:12:1 [INFO] [stdout] | [INFO] [stdout] 12 | pub unsafe fn null(out: &mut Local, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_boolean` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:18:5 [INFO] [stdout] | [INFO] [stdout] 18 | napi::get_boolean(env, b, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | pub unsafe fn boolean(out: &mut Local, env: Env, b: bool) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_bool` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:26:9 [INFO] [stdout] | [INFO] [stdout] 26 | napi::get_value_bool(env, p, &mut value as *mut bool), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn boolean_value(env: Env, p: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_double` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:35:5 [INFO] [stdout] | [INFO] [stdout] 35 | napi::create_double(env, v, out as *mut Local); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | pub unsafe fn number(out: &mut Local, env: Env, v: f64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_double` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/primitive.rs:43:9 [INFO] [stdout] | [INFO] [stdout] 43 | napi::get_value_double(env, p, &mut value as *mut f64), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/primitive.rs:40:1 [INFO] [stdout] | [INFO] [stdout] 40 | pub unsafe fn number_value(env: Env, p: Local) -> f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:19:9 [INFO] [stdout] | [INFO] [stdout] 19 | napi::create_promise(env, deferred.as_mut_ptr(), promise.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn create(env: Env) -> (napi::Deferred, napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:23:6 [INFO] [stdout] | [INFO] [stdout] 23 | (deferred.assume_init(), promise.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:23:30 [INFO] [stdout] | [INFO] [stdout] 23 | (deferred.assume_init(), promise.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::resolve_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:33:9 [INFO] [stdout] | [INFO] [stdout] 33 | napi::resolve_deferred(env, deferred, resolution), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:31:1 [INFO] [stdout] | [INFO] [stdout] 31 | pub unsafe fn resolve(env: Env, deferred: napi::Deferred, resolution: napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reject_deferred` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:45:9 [INFO] [stdout] | [INFO] [stdout] 45 | napi::reject_deferred(env, deferred, rejection), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn reject(env: Env, deferred: napi::Deferred, rejection: napi::Value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:56:15 [INFO] [stdout] | [INFO] [stdout] 56 | let msg = super::string(env, msg); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/promise.rs:55:1 [INFO] [stdout] | [INFO] [stdout] 55 | pub unsafe fn reject_err_message(env: Env, deferred: napi::Deferred, msg: impl AsRef) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:60:9 [INFO] [stdout] | [INFO] [stdout] 60 | napi::create_error(env, std::ptr::null_mut(), msg, err.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::promise::reject` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | reject(env, deferred, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/promise.rs:64:27 [INFO] [stdout] | [INFO] [stdout] 64 | reject(env, deferred, err.assume_init()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_reference` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:12:9 [INFO] [stdout] | [INFO] [stdout] 12 | napi::create_reference(env, value, 1, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(env: Env, value: Local) -> napi::Ref { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:16:5 [INFO] [stdout] | [INFO] [stdout] 16 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reference_ref` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:25:9 [INFO] [stdout] | [INFO] [stdout] 25 | napi::reference_ref(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:21:1 [INFO] [stdout] | [INFO] [stdout] 21 | pub unsafe fn reference(env: Env, value: napi::Ref) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 29 | result.assume_init() as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::reference_unref` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:38:9 [INFO] [stdout] | [INFO] [stdout] 38 | napi::reference_unref(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:34:1 [INFO] [stdout] | [INFO] [stdout] 34 | pub unsafe fn unreference(env: Env, value: napi::Ref) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:42:8 [INFO] [stdout] | [INFO] [stdout] 42 | if result.assume_init() == 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_reference` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:43:20 [INFO] [stdout] | [INFO] [stdout] 43 | assert_eq!(napi::delete_reference(env, value), napi::Status::Ok); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_reference_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:53:9 [INFO] [stdout] | [INFO] [stdout] 53 | napi::get_reference_value(env, value, result.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/reference.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | pub unsafe fn get(env: Env, value: napi::Ref) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/reference.rs:57:5 [INFO] [stdout] | [INFO] [stdout] 57 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::open_handle_scope` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:18:13 [INFO] [stdout] | [INFO] [stdout] 18 | napi::open_handle_scope(env, scope.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:14:5 [INFO] [stdout] | [INFO] [stdout] 14 | pub(crate) unsafe fn new(env: Env) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:24:20 [INFO] [stdout] | [INFO] [stdout] 24 | scope: scope.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::open_escapable_handle_scope` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:49:13 [INFO] [stdout] | [INFO] [stdout] 49 | napi::open_escapable_handle_scope(env, scope.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:45:5 [INFO] [stdout] | [INFO] [stdout] 45 | pub(crate) unsafe fn new(env: Env) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:55:20 [INFO] [stdout] | [INFO] [stdout] 55 | scope: scope.assume_init(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::escape_handle` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 63 | napi::escape_handle(self.env, self.scope, value, escapee.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:59:5 [INFO] [stdout] | [INFO] [stdout] 59 | pub(crate) unsafe fn escape(&self, value: napi::Value) -> napi::Value { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:67:9 [INFO] [stdout] | [INFO] [stdout] 67 | escapee.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_global` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/scope.rs:82:16 [INFO] [stdout] | [INFO] [stdout] 82 | assert_eq!(super::get_global(env, out as *mut _), napi::Status::Ok); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/scope.rs:81:1 [INFO] [stdout] | [INFO] [stdout] 81 | pub unsafe fn get_global(env: Env, out: &mut Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:9:18 [INFO] [stdout] | [INFO] [stdout] 9 | let status = napi::create_string_utf8(env, data as *const _, len as usize, out); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(out: &mut Local, env: Env, data: *const u8, len: i32) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:16:18 [INFO] [stdout] | [INFO] [stdout] 16 | let status = napi::get_value_string_utf8(env, value, ptr::null_mut(), 0, len.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:14:1 [INFO] [stdout] | [INFO] [stdout] 14 | pub unsafe fn utf8_len(env: Env, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:20:5 [INFO] [stdout] | [INFO] [stdout] 20 | len.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:25:18 [INFO] [stdout] | [INFO] [stdout] 25 | let status = napi::get_value_string_utf8(env, value, out as *mut _, len, read.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn data(env: Env, out: *mut u8, len: usize, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 29 | read.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf16` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | let status = napi::get_value_string_utf16(env, value, ptr::null_mut(), 0, len.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | pub unsafe fn utf16_len(env: Env, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:38:5 [INFO] [stdout] | [INFO] [stdout] 38 | len.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_value_string_utf16` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:43:18 [INFO] [stdout] | [INFO] [stdout] 43 | let status = napi::get_value_string_utf16(env, value, out, len, read.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | pub unsafe fn data_utf16(env: Env, out: *mut u16, len: usize, value: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:47:5 [INFO] [stdout] | [INFO] [stdout] 47 | read.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::run_script` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/string.rs:51:18 [INFO] [stdout] | [INFO] [stdout] 51 | let status = napi::run_script(env, value, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/string.rs:50:1 [INFO] [stdout] | [INFO] [stdout] 50 | pub unsafe fn run_script(out: &mut Local, env: Env, value: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::typeof_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | napi::typeof_value(env, val, &mut actual as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:7:1 [INFO] [stdout] | [INFO] [stdout] 7 | unsafe fn is_type(env: Env, val: Local, expect: napi::ValueType) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:17:5 [INFO] [stdout] | [INFO] [stdout] 17 | is_type(env, val, napi::ValueType::Undefined) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | pub unsafe fn is_undefined(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:21:5 [INFO] [stdout] | [INFO] [stdout] 21 | is_type(env, val, napi::ValueType::Null) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | pub unsafe fn is_null(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:26:5 [INFO] [stdout] | [INFO] [stdout] 26 | is_type(env, val, napi::ValueType::Number) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:25:1 [INFO] [stdout] | [INFO] [stdout] 25 | pub unsafe fn is_number(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:31:5 [INFO] [stdout] | [INFO] [stdout] 31 | is_type(env, val, napi::ValueType::Boolean) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe fn is_boolean(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:36:5 [INFO] [stdout] | [INFO] [stdout] 36 | is_type(env, val, napi::ValueType::String) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | pub unsafe fn is_string(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | is_type(env, val, napi::ValueType::Object) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:39:1 [INFO] [stdout] | [INFO] [stdout] 39 | pub unsafe fn is_object(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_array` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:46:9 [INFO] [stdout] | [INFO] [stdout] 46 | napi::is_array(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | pub unsafe fn is_array(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:53:5 [INFO] [stdout] | [INFO] [stdout] 53 | is_type(env, val, napi::ValueType::Function) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | pub unsafe fn is_function(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:59:9 [INFO] [stdout] | [INFO] [stdout] 59 | napi::is_error(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:56:1 [INFO] [stdout] | [INFO] [stdout] 56 | pub unsafe fn is_error(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_buffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:69:9 [INFO] [stdout] | [INFO] [stdout] 69 | napi::is_buffer(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:66:1 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn is_buffer(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_arraybuffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | napi::is_arraybuffer(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:76:1 [INFO] [stdout] | [INFO] [stdout] 76 | pub unsafe fn is_arraybuffer(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_typedarray` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | napi::is_typedarray(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:86:1 [INFO] [stdout] | [INFO] [stdout] 86 | pub unsafe fn is_typedarray(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::is_date` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:99:9 [INFO] [stdout] | [INFO] [stdout] 99 | napi::is_date(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:96:1 [INFO] [stdout] | [INFO] [stdout] 96 | pub unsafe fn is_date(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_promise` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:112:9 [INFO] [stdout] | [INFO] [stdout] 112 | napi::is_promise(env, val, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:109:1 [INFO] [stdout] | [INFO] [stdout] 109 | pub unsafe fn is_promise(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::type_tag_object` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:121:9 [INFO] [stdout] | [INFO] [stdout] 121 | napi::type_tag_object(env, object, tag as *const _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | pub unsafe fn type_tag_object(env: Env, object: Local, tag: &super::TypeTag) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::check_object_type_tag` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:130:9 [INFO] [stdout] | [INFO] [stdout] 130 | napi::check_object_type_tag(env, object, tag as *const _, &mut result as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | pub unsafe fn check_object_type_tag(env: Env, object: Local, tag: &super::TypeTag) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tag::is_type` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tag.rs:138:5 [INFO] [stdout] | [INFO] [stdout] 138 | is_type(env, val, napi::ValueType::BigInt) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tag.rs:137:1 [INFO] [stdout] | [INFO] [stdout] 137 | pub unsafe fn is_bigint(env: Env, val: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_typedarray_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:28:9 [INFO] [stdout] | [INFO] [stdout] 28 | / napi::get_typedarray_info( [INFO] [stdout] 29 | | env, [INFO] [stdout] 30 | | value, [INFO] [stdout] 31 | | &mut (*ptr).typ, [INFO] [stdout] ... | [INFO] [stdout] 35 | | &mut (*ptr).offset, [INFO] [stdout] 36 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/typedarray.rs:23:1 [INFO] [stdout] | [INFO] [stdout] 23 | pub unsafe fn info(env: Env, value: Local) -> TypedArrayInfo { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:31:18 [INFO] [stdout] | [INFO] [stdout] 31 | &mut (*ptr).typ, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:32:18 [INFO] [stdout] | [INFO] [stdout] 32 | &mut (*ptr).length, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:33:18 [INFO] [stdout] | [INFO] [stdout] 33 | &mut (*ptr).data, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:34:18 [INFO] [stdout] | [INFO] [stdout] 34 | &mut (*ptr).buf, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:35:18 [INFO] [stdout] | [INFO] [stdout] 35 | &mut (*ptr).offset, [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:40:5 [INFO] [stdout] | [INFO] [stdout] 40 | info.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_typedarray` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:51:18 [INFO] [stdout] | [INFO] [stdout] 51 | let status = napi::create_typedarray(env, typ, len, buffer, offset, array.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/typedarray.rs:43:1 [INFO] [stdout] | [INFO] [stdout] 43 | / pub unsafe fn new( [INFO] [stdout] 44 | | env: Env, [INFO] [stdout] 45 | | typ: TypedArrayType, [INFO] [stdout] 46 | | buffer: Local, [INFO] [stdout] 47 | | offset: usize, [INFO] [stdout] 48 | | len: usize, [INFO] [stdout] 49 | | ) -> Result { [INFO] [stdout] | |________________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/typedarray.rs:59:8 [INFO] [stdout] | [INFO] [stdout] 59 | Ok(array.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:7:5 [INFO] [stdout] | [INFO] [stdout] 7 | / generate!( [INFO] [stdout] 8 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-1")))] [INFO] [stdout] 9 | | extern "C" { [INFO] [stdout] 10 | | fn get_undefined(env: Env, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 257 | | } [INFO] [stdout] 258 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:266:5 [INFO] [stdout] | [INFO] [stdout] 266 | / generate!( [INFO] [stdout] 267 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-4")))] [INFO] [stdout] 268 | | extern "C" { [INFO] [stdout] 269 | | fn create_threadsafe_function( [INFO] [stdout] ... | [INFO] [stdout] 297 | | } [INFO] [stdout] 298 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:306:5 [INFO] [stdout] | [INFO] [stdout] 306 | / generate!( [INFO] [stdout] 307 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-5")))] [INFO] [stdout] 308 | | extern "C" { [INFO] [stdout] 309 | | fn create_date(env: Env, value: f64, result: *mut Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 323 | | } [INFO] [stdout] 324 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:332:5 [INFO] [stdout] | [INFO] [stdout] 332 | / generate!( [INFO] [stdout] 333 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-6")))] [INFO] [stdout] 334 | | extern "C" { [INFO] [stdout] 335 | | fn get_all_property_names( [INFO] [stdout] ... | [INFO] [stdout] 386 | | } [INFO] [stdout] 387 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:143:13 [INFO] [stdout] | [INFO] [stdout] 143 | NAPI = Napi { [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:140:9 [INFO] [stdout] | [INFO] [stdout] 140 | pub(super) unsafe fn load(host: &libloading::Library) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:145:34 [INFO] [stdout] | [INFO] [stdout] 145 | $name: match host.get(napi_name!($name).as_bytes()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:153:29 [INFO] [stdout] | [INFO] [stdout] 153 | ... NAPI.$name [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:17 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/mod.rs:169:13 [INFO] [stdout] | [INFO] [stdout] 169 | pub unsafe fn $name($($param: $ptype,)*)$( -> $rtype)* { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/mod.rs:170:18 [INFO] [stdout] | [INFO] [stdout] 170 | (NAPI.$name)($($param,)*) [INFO] [stdout] | ^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] ::: src/sys/bindings/functions.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | / generate!( [INFO] [stdout] 395 | | #[cfg_attr(docsrs, doc(cfg(feature = "napi-8")))] [INFO] [stdout] 396 | | extern "C" { [INFO] [stdout] 397 | | fn object_freeze(env: Env, object: Value) -> Status; [INFO] [stdout] ... | [INFO] [stdout] 406 | | } [INFO] [stdout] 407 | | ); [INFO] [stdout] | |_____- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] = note: this warning originates in the macro `generate` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `libloading::Library::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:424:23 [INFO] [stdout] | [INFO] [stdout] 424 | let get_version = host.get:: Status>(b"napi_get_version")?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/functions.rs:423:1 [INFO] [stdout] | [INFO] [stdout] 423 | unsafe fn get_version(host: &libloading::Library, env: Env) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::get_version` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:440:26 [INFO] [stdout] | [INFO] [stdout] 440 | let actual_version = get_version(&host, env).expect("Failed to find N-API version"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/bindings/functions.rs:432:1 [INFO] [stdout] | [INFO] [stdout] 432 | pub(crate) unsafe fn load(env: Env) -> Result<(), libloading::Error> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:457:5 [INFO] [stdout] | [INFO] [stdout] 457 | napi1::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | napi4::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:463:5 [INFO] [stdout] | [INFO] [stdout] 463 | napi5::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:466:5 [INFO] [stdout] | [INFO] [stdout] 466 | napi6::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi8::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/bindings/functions.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | napi8::load(&host); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::tsfn::ThreadsafeFunction::::with_capacity` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:47:9 [INFO] [stdout] | [INFO] [stdout] 47 | Self::with_capacity(env, 0, callback) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:46:5 [INFO] [stdout] | [INFO] [stdout] 46 | pub unsafe fn new(env: Env, callback: fn(Option, T)) -> Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::create_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:61:13 [INFO] [stdout] | [INFO] [stdout] 61 | / napi::create_threadsafe_function( [INFO] [stdout] 62 | | env, [INFO] [stdout] 63 | | std::ptr::null_mut(), [INFO] [stdout] 64 | | std::ptr::null_mut(), [INFO] [stdout] ... | [INFO] [stdout] 74 | | result.as_mut_ptr(), [INFO] [stdout] 75 | | ), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:52:5 [INFO] [stdout] | [INFO] [stdout] 52 | / pub unsafe fn with_capacity( [INFO] [stdout] 53 | | env: Env, [INFO] [stdout] 54 | | max_queue_size: usize, [INFO] [stdout] 55 | | callback: fn(Option, T), [INFO] [stdout] 56 | | ) -> Self { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:65:17 [INFO] [stdout] | [INFO] [stdout] 65 | super::string(env, "neon threadsafe function"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:80:24 [INFO] [stdout] | [INFO] [stdout] 80 | tsfn: Tsfn(result.assume_init()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::ref_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:132:13 [INFO] [stdout] | [INFO] [stdout] 132 | napi::ref_threadsafe_function(env, self.tsfn.0), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:130:5 [INFO] [stdout] | [INFO] [stdout] 130 | pub unsafe fn reference(&self, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi4::unref_threadsafe_function` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:141:13 [INFO] [stdout] | [INFO] [stdout] 141 | napi::unref_threadsafe_function(env, self.tsfn.0), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:139:5 [INFO] [stdout] | [INFO] [stdout] 139 | pub unsafe fn unref(&self, env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::sync::Arc::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:149:28 [INFO] [stdout] | [INFO] [stdout] 149 | let is_finalized = Arc::from_raw(data as *mut Mutex); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:148:5 [INFO] [stdout] | [INFO] [stdout] 148 | unsafe extern "C" fn finalize(_env: Env, data: *mut c_void, _hint: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:171:44 [INFO] [stdout] | [INFO] [stdout] 171 | let Callback { callback, data } = *Box::from_raw(data as *mut Callback); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/tsfn.rs:165:5 [INFO] [stdout] | [INFO] [stdout] 165 | / unsafe extern "C" fn callback( [INFO] [stdout] 166 | | env: Env, [INFO] [stdout] 167 | | _js_callback: napi::Value, [INFO] [stdout] 168 | | _context: *mut c_void, [INFO] [stdout] 169 | | data: *mut c_void, [INFO] [stdout] 170 | | ) { [INFO] [stdout] | |_____^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::FailureBoundary::catch_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/tsfn.rs:173:9 [INFO] [stdout] | [INFO] [stdout] 173 | / BOUNDARY.catch_failure(env, None, move |env| { [INFO] [stdout] 174 | | callback(env, data); [INFO] [stdout] 175 | | ptr::null_mut() [INFO] [stdout] 176 | | }); [INFO] [stdout] | |__________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::create_date` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:15:18 [INFO] [stdout] | [INFO] [stdout] 15 | let status = napi::create_date(env, value, local.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/date.rs:13:1 [INFO] [stdout] | [INFO] [stdout] 13 | pub unsafe fn new_date(env: Env, value: f64) -> Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:17:5 [INFO] [stdout] | [INFO] [stdout] 17 | local.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi5::get_date_value` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/date.rs:28:18 [INFO] [stdout] | [INFO] [stdout] 28 | let status = napi::get_date_value(env, p, &mut value as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/date.rs:26:1 [INFO] [stdout] | [INFO] [stdout] 26 | pub unsafe fn value(env: Env, p: Local) -> f64 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::set_instance_data` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | napi::set_instance_data(env, data.cast(), Some(drop_box::), ptr::null_mut(),), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:17:1 [INFO] [stdout] | [INFO] [stdout] 17 | pub unsafe fn set_instance_data(env: Env, data: T) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi6::get_instance_data` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:37:9 [INFO] [stdout] | [INFO] [stdout] 37 | napi::get_instance_data(env, data.as_mut_ptr(),), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn get_instance_data(env: Env) -> *mut T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:41:5 [INFO] [stdout] | [INFO] [stdout] 41 | data.assume_init().cast() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/lifecycle.rs:45:10 [INFO] [stdout] | [INFO] [stdout] 45 | drop(Box::::from_raw(data.cast())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/lifecycle.rs:44:1 [INFO] [stdout] | [INFO] [stdout] 44 | unsafe extern "C" fn drop_box(_env: Env, data: *mut c_void, _hint: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_string_utf8` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:117:9 [INFO] [stdout] | [INFO] [stdout] 117 | / create_string_utf8( [INFO] [stdout] 118 | | env, [INFO] [stdout] 119 | | s.as_bytes().as_ptr() as *const _, [INFO] [stdout] 120 | | s.len(), [INFO] [stdout] 121 | | result.as_mut_ptr(), [INFO] [stdout] 122 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mod.rs:112:1 [INFO] [stdout] | [INFO] [stdout] 112 | unsafe fn string(env: Env, s: impl AsRef) -> raw::Local { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:126:5 [INFO] [stdout] | [INFO] [stdout] 126 | result.assume_init() [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::load` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/mod.rs:139:24 [INFO] [stdout] | [INFO] [stdout] 139 | SETUP.call_once(|| load(env).expect("Failed to load N-API symbols")); [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/mod.rs:138:1 [INFO] [stdout] | [INFO] [stdout] 138 | pub unsafe fn setup(env: Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::external::deref` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/boxed.rs:161:5 [INFO] [stdout] | [INFO] [stdout] 161 | external::deref::(env.to_raw(), local).map(|v| &*v) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/boxed.rs:160:1 [INFO] [stdout] | [INFO] [stdout] 160 | unsafe fn maybe_external_deref<'a>(env: Env, local: raw::Local) -> Option<&'a BoxAny> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/boxed.rs:161:61 [INFO] [stdout] | [INFO] [stdout] 161 | external::deref::(env.to_raw(), local).map(|v| &*v) [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::buffer::uninitialized` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/buffer/types.rs:82:22 [INFO] [stdout] | [INFO] [stdout] 82 | let result = sys::buffer::uninitialized(cx.env().to_raw(), len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/buffer/types.rs:81:5 [INFO] [stdout] | [INFO] [stdout] 81 | pub unsafe fn uninitialized<'a, C: Context<'a>>(cx: &mut C, len: usize) -> JsResult<'a, Self> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `result::Throw::new` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/buffer/types.rs:87:17 [INFO] [stdout] | [INFO] [stdout] 87 | Err(Throw::new()) [INFO] [stdout] | ^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::promise::reject_err_message` is unsafe and requires unsafe block [INFO] [stdout] --> src/types_impl/promise.rs:395:9 [INFO] [stdout] | [INFO] [stdout] 395 | / sys::promise::reject_err_message( [INFO] [stdout] 396 | | env, [INFO] [stdout] 397 | | self.0, [INFO] [stdout] 398 | | "`neon::types::Deferred` was dropped without being settled", [INFO] [stdout] 399 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/types_impl/promise.rs:394:5 [INFO] [stdout] | [INFO] [stdout] 394 | pub(crate) unsafe fn leaked(self, env: raw::Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: struct `InheritedHandleScope` is never constructed [INFO] [stdout] --> src/sys/raw.rs:52:12 [INFO] [stdout] | [INFO] [stdout] 52 | pub struct InheritedHandleScope; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `InheritedHandleScope` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/context/mod.rs:686:23 [INFO] [stdout] | [INFO] [stdout] 686 | let argv = if let Some(argv) = self.arguments.as_ref() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^--------------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/context/mod.rs:688:9 [INFO] [stdout] | [INFO] [stdout] 688 | } else { [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 686 ~ let argv = match self.arguments.as_ref() { Some(argv) => { [INFO] [stdout] 687 | argv [INFO] [stdout] 688 ~ } _ => { [INFO] [stdout] 689 | let argv = self.info.argv(self); [INFO] [stdout] 690 | self.arguments.insert(argv) [INFO] [stdout] 691 ~ }}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/context/internal.rs:41:19 [INFO] [stdout] | [INFO] [stdout] 41 | } else if let Ok(result) = result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^------ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/context/internal.rs:43:9 [INFO] [stdout] | [INFO] [stdout] 43 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 41 ~ } else { match result { Ok(result) => { [INFO] [stdout] 42 | Ok(result) [INFO] [stdout] 43 ~ } _ => { [INFO] [stdout] 44 | panic!("try_catch: unexpected Err(Throw) when VM is not in a throwing state"); [INFO] [stdout] 45 ~ }}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/sys/no_panic.rs:224:8 [INFO] [stdout] | [INFO] [stdout] 224 | if let Some(msg) = panic_msg(&panic) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^-----^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/sys/no_panic.rs:226:5 [INFO] [stdout] | [INFO] [stdout] 226 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 224 ~ match panic_msg(&panic) { Some(msg) => { [INFO] [stdout] 225 | error_from_message(env, msg) [INFO] [stdout] 226 ~ } _ => { [INFO] [stdout] 227 | let error = error_from_message(env, UNKNOWN_PANIC_MESSAGE); [INFO] [stdout] ... [INFO] [stdout] 231 | error [INFO] [stdout] 232 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/mod.rs:1148:16 [INFO] [stdout] | [INFO] [stdout] 1148 | if let Ok(raw) = sys::fun::new(cx.env().to_raw(), name, f) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^-^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/mod.rs:1150:13 [INFO] [stdout] | [INFO] [stdout] 1150 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 1148 ~ match sys::fun::new(cx.env().to_raw(), name, f) { Ok(raw) => { [INFO] [stdout] 1149 | Ok(Handle::new_internal(JsFunction { raw })) [INFO] [stdout] 1150 ~ } _ => { [INFO] [stdout] 1151 | Err(Throw::new()) [INFO] [stdout] 1152 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:395:12 [INFO] [stdout] | [INFO] [stdout] 395 | if let Some(v) = self { [INFO] [stdout] | ^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:397:9 [INFO] [stdout] | [INFO] [stdout] 397 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 395 ~ match self { Some(v) => { [INFO] [stdout] 396 | v.finalize(cx); [INFO] [stdout] 397 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:403:12 [INFO] [stdout] | [INFO] [stdout] 403 | if let Ok(v) = std::rc::Rc::try_unwrap(self) { [INFO] [stdout] | ^^^^^^^^^^^^----------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:405:9 [INFO] [stdout] | [INFO] [stdout] 405 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 403 ~ match std::rc::Rc::try_unwrap(self) { Ok(v) => { [INFO] [stdout] 404 | v.finalize(cx); [INFO] [stdout] 405 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:411:12 [INFO] [stdout] | [INFO] [stdout] 411 | if let Ok(v) = std::sync::Arc::try_unwrap(self) { [INFO] [stdout] | ^^^^^^^^^^^^-------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:413:9 [INFO] [stdout] | [INFO] [stdout] 413 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 411 ~ match std::sync::Arc::try_unwrap(self) { Ok(v) => { [INFO] [stdout] 412 | v.finalize(cx); [INFO] [stdout] 413 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:419:12 [INFO] [stdout] | [INFO] [stdout] 419 | if let Ok(v) = self.into_inner() { [INFO] [stdout] | ^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:421:9 [INFO] [stdout] | [INFO] [stdout] 421 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 419 ~ match self.into_inner() { Ok(v) => { [INFO] [stdout] 420 | v.finalize(cx); [INFO] [stdout] 421 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:427:12 [INFO] [stdout] | [INFO] [stdout] 427 | if let Ok(v) = self.into_inner() { [INFO] [stdout] | ^^^^^^^^^^^^----------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/boxed.rs:429:9 [INFO] [stdout] | [INFO] [stdout] 429 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 427 ~ match self.into_inner() { Ok(v) => { [INFO] [stdout] 428 | v.finalize(cx); [INFO] [stdout] 429 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:123:26 [INFO] [stdout] | [INFO] [stdout] 123 | let msg = if let Some(string) = panic.downcast_ref::() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^-----^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] 124 | format!("internal error in Neon module: {}", string) [INFO] [stdout] 125 | } else if let Some(str) = panic.downcast_ref::<&str>() { [INFO] [stdout] | ----- this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:125:13 [INFO] [stdout] | [INFO] [stdout] 125 | } else if let Some(str) = panic.downcast_ref::<&str>() { [INFO] [stdout] | ^ [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/error.rs:127:13 [INFO] [stdout] | [INFO] [stdout] 127 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 123 ~ let msg = match panic.downcast_ref::() { Some(string) => { [INFO] [stdout] 124 | format!("internal error in Neon module: {}", string) [INFO] [stdout] 125 ~ } _ => { match panic.downcast_ref::<&str>() { Some(str) => { [INFO] [stdout] 126 | format!("internal error in Neon module: {}", str) [INFO] [stdout] 127 ~ } _ => { [INFO] [stdout] 128 | "internal error in Neon module".to_string() [INFO] [stdout] 129 ~ }}}}; [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/extract/mod.rs:219:12 [INFO] [stdout] | [INFO] [stdout] 219 | if let Some((v,)) = private::FromArgsInternal::from_args_opt(cx)? { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^--------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/extract/mod.rs:221:9 [INFO] [stdout] | [INFO] [stdout] 221 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 219 ~ match private::FromArgsInternal::from_args_opt(cx)? { Some((v,)) => { [INFO] [stdout] 220 | Ok(Some(v)) [INFO] [stdout] 221 ~ } _ => { [INFO] [stdout] 222 | Ok(None) [INFO] [stdout] 223 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/types_impl/extract/try_into_js.rs:70:12 [INFO] [stdout] | [INFO] [stdout] 70 | if let Some(val) = self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^---- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/types_impl/extract/try_into_js.rs:72:9 [INFO] [stdout] | [INFO] [stdout] 72 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 70 ~ match self { Some(val) => { [INFO] [stdout] 71 | val.try_into_js(cx).map(|v| v.upcast()) [INFO] [stdout] 72 ~ } _ => { [INFO] [stdout] 73 | Ok(cx.undefined().upcast()) [INFO] [stdout] 74 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 295 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 16.89s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking neon v1.1.0-alpha.0 (/tmp/fixit) [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/context/internal.rs:69:3 [INFO] [stdout] | [INFO] [stdout] 69 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 69 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:264:38 [INFO] [stdout] | [INFO] [stdout] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stdout] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stdout] | | [INFO] [stdout] | lifetime `'b` declared here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:536:65 [INFO] [stdout] | [INFO] [stdout] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stdout] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:105:71 [INFO] [stdout] | [INFO] [stdout] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:116:81 [INFO] [stdout] | [INFO] [stdout] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stdout] | ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/context/internal.rs:69:3 [INFO] [stdout] | [INFO] [stdout] 69 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 69 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:264:38 [INFO] [stdout] | [INFO] [stdout] 264 | fn lock<'b>(&'b mut self) -> Lock [INFO] [stdout] | -- ^ this elided lifetime gets resolved as `'b` [INFO] [stdout] | | [INFO] [stdout] | lifetime `'b` declared here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(elided_named_lifetimes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/context/mod.rs:536:65 [INFO] [stdout] | [INFO] [stdout] 536 | fn task<'cx, O, E>(&'cx mut self, execute: E) -> TaskBuilder [INFO] [stdout] | --- lifetime `'cx` declared here ^ this elided lifetime gets resolved as `'cx` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:105:71 [INFO] [stdout] | [INFO] [stdout] 105 | pub(crate) fn get<'cx, 'a, C>(cx: &'a mut C, id: usize) -> Option<&mut LocalCellValue> [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:116:81 [INFO] [stdout] | [INFO] [stdout] 116 | pub(crate) fn get_or_init<'cx, 'a, C, F>(cx: &'a mut C, id: usize, f: F) -> &mut LocalCellValue [INFO] [stdout] | -- lifetime `'a` declared here ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: elided lifetime has a name [INFO] [stdout] --> src/lifecycle.rs:132:17 [INFO] [stdout] | [INFO] [stdout] 128 | pub(crate) fn get_or_try_init<'cx, 'a, C, E, F>( [INFO] [stdout] | -- lifetime `'a` declared here [INFO] [stdout] ... [INFO] [stdout] 132 | ) -> Result<&mut LocalCellValue, E> [INFO] [stdout] | ^ this elided lifetime gets resolved as `'a` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::error::catch_error` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | if sys::error::catch_error(self.to_raw(), local.as_mut_ptr()) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:32:5 [INFO] [stdout] | [INFO] [stdout] 32 | / pub(super) unsafe fn try_catch(self, f: F) -> Result [INFO] [stdout] 33 | | where [INFO] [stdout] 34 | | F: FnOnce() -> Result, [INFO] [stdout] | |_______________________________________________________^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:40:17 [INFO] [stdout] | [INFO] [stdout] 40 | Err(local.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::setup` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:73:5 [INFO] [stdout] | [INFO] [stdout] 73 | sys::setup(env); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/context/internal.rs:70:1 [INFO] [stdout] | [INFO] [stdout] 70 | unsafe extern "C" fn napi_register_module_v1(env: *mut c_void, m: *mut c_void) -> *mut c_void { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `types_impl::private::ValueInternal::from_local` is unsafe and requires unsafe block [INFO] [stdout] --> src/context/internal.rs:80:40 [INFO] [stdout] | [INFO] [stdout] 80 | let exports = Handle::new_internal(JsObject::from_local(env, m.cast())); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::reference::unreference` is unsafe and requires unsafe block [INFO] [stdout] --> src/handle/root.rs:34:9 [INFO] [stdout] | [INFO] [stdout] 34 | reference::unreference(env, self.0.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/handle/root.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | pub(crate) unsafe fn unref(self, env: raw::Env) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | sys::object::get_index(out, cx.env().to_raw(), obj, self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:65:5 [INFO] [stdout] | [INFO] [stdout] 65 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 66 | | self, [INFO] [stdout] 67 | | cx: &mut C, [INFO] [stdout] 68 | | out: &mut raw::Local, [INFO] [stdout] 69 | | obj: raw::Local, [INFO] [stdout] 70 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_index` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:81:9 [INFO] [stdout] | [INFO] [stdout] 81 | sys::object::set_index(out, cx.env().to_raw(), obj, self, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:74:5 [INFO] [stdout] | [INFO] [stdout] 74 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 75 | | self, [INFO] [stdout] 76 | | cx: &mut C, [INFO] [stdout] 77 | | out: &mut bool, [INFO] [stdout] 78 | | obj: raw::Local, [INFO] [stdout] 79 | | val: raw::Local, [INFO] [stdout] 80 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:94:9 [INFO] [stdout] | [INFO] [stdout] 94 | sys::object::get(out, env, obj, self.to_local()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:86:5 [INFO] [stdout] | [INFO] [stdout] 86 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 87 | | self, [INFO] [stdout] 88 | | cx: &mut C, [INFO] [stdout] 89 | | out: &mut raw::Local, [INFO] [stdout] 90 | | obj: raw::Local, [INFO] [stdout] 91 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:106:9 [INFO] [stdout] | [INFO] [stdout] 106 | sys::object::set(out, env, obj, self.to_local(), val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:97:5 [INFO] [stdout] | [INFO] [stdout] 97 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 98 | | self, [INFO] [stdout] 99 | | cx: &mut C, [INFO] [stdout] 100 | | out: &mut bool, [INFO] [stdout] 101 | | obj: raw::Local, [INFO] [stdout] 102 | | val: raw::Local, [INFO] [stdout] 103 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::get_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:120:9 [INFO] [stdout] | [INFO] [stdout] 120 | sys::object::get_string(env, out, obj, ptr, len) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:111:5 [INFO] [stdout] | [INFO] [stdout] 111 | / unsafe fn get_from<'c, C: Context<'c>>( [INFO] [stdout] 112 | | self, [INFO] [stdout] 113 | | cx: &mut C, [INFO] [stdout] 114 | | out: &mut raw::Local, [INFO] [stdout] 115 | | obj: raw::Local, [INFO] [stdout] 116 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::object::set_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/object/mod.rs:133:9 [INFO] [stdout] | [INFO] [stdout] 133 | sys::object::set_string(env, out, obj, ptr, len, val) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/object/mod.rs:123:5 [INFO] [stdout] | [INFO] [stdout] 123 | / unsafe fn set_from<'c, C: Context<'c>>( [INFO] [stdout] 124 | | self, [INFO] [stdout] 125 | | cx: &mut C, [INFO] [stdout] 126 | | out: &mut bool, [INFO] [stdout] 127 | | obj: raw::Local, [INFO] [stdout] 128 | | val: raw::Local, [INFO] [stdout] 129 | | ) -> bool { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_array_with_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | napi::create_array_with_length(env, length, out as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn new(out: &mut Local, env: Env, length: usize) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_array_length` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/array.rs:23:9 [INFO] [stdout] | [INFO] [stdout] 23 | napi::get_array_length(env, array, &mut len as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/array.rs:20:1 [INFO] [stdout] | [INFO] [stdout] 20 | pub unsafe fn len(env: Env, array: Local) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_arraybuffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:12:18 [INFO] [stdout] | [INFO] [stdout] 12 | let status = napi::create_arraybuffer(env, len, null_mut(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:20:8 [INFO] [stdout] | [INFO] [stdout] 20 | Ok(buf.assume_init()) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:57:1 [INFO] [stdout] | [INFO] [stdout] 57 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:5 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:70:31 [INFO] [stdout] | [INFO] [stdout] 70 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_arraybuffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/arraybuffer.rs:80:9 [INFO] [stdout] | [INFO] [stdout] 80 | napi::get_arraybuffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/arraybuffer.rs:75:1 [INFO] [stdout] | [INFO] [stdout] 75 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | / napi::create_async_work( [INFO] [stdout] 63 | | env, [INFO] [stdout] 64 | | ptr::null_mut(), [INFO] [stdout] 65 | | super::string(env, "neon_async_work"), [INFO] [stdout] ... | [INFO] [stdout] 69 | | work, [INFO] [stdout] 70 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:36:1 [INFO] [stdout] | [INFO] [stdout] 36 | / pub unsafe fn schedule( [INFO] [stdout] 37 | | env: Env, [INFO] [stdout] 38 | | input: I, [INFO] [stdout] 39 | | execute: Execute, [INFO] [stdout] ... | [INFO] [stdout] 44 | | O: Send + 'static, [INFO] [stdout] 45 | | D: 'static, [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:65:13 [INFO] [stdout] | [INFO] [stdout] 65 | super::string(env, "neon_async_work"), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::queue_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:11 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:75:39 [INFO] [stdout] | [INFO] [stdout] 75 | match napi::queue_async_work(env, *work) { [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:13 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:79:42 [INFO] [stdout] | [INFO] [stdout] 79 | napi::delete_async_work(env, *work); [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:128:21 [INFO] [stdout] | [INFO] [stdout] 128 | let data = &mut *data.cast::>(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:127:1 [INFO] [stdout] | [INFO] [stdout] 127 | unsafe extern "C" fn call_execute(_: Env, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::::from_raw` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:153:10 [INFO] [stdout] | [INFO] [stdout] 153 | } = *Box::>::from_raw(data.cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/async_work.rs:146:1 [INFO] [stdout] | [INFO] [stdout] 146 | unsafe extern "C" fn call_complete(env: Env, status: napi::Status, data: *mut c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::delete_async_work` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:155:5 [INFO] [stdout] | [INFO] [stdout] 155 | napi::delete_async_work(env, work); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::no_panic::FailureBoundary::catch_failure` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/async_work.rs:157:5 [INFO] [stdout] | [INFO] [stdout] 157 | / BOUNDARY.catch_failure(env, None, move |env| { [INFO] [stdout] 158 | | // `unwrap` is okay because `call_complete` should be called exactly once [INFO] [stdout] 159 | | // if and only if `call_execute` has completed successfully [INFO] [stdout] 160 | | let output = state.into_output().unwrap(); [INFO] [stdout] ... | [INFO] [stdout] 180 | | ptr::null_mut() [INFO] [stdout] 181 | | }); [INFO] [stdout] | |______^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::buffer::uninitialized` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:11:24 [INFO] [stdout] | [INFO] [stdout] 11 | let (buf, bytes) = uninitialized(env, len)?; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:10:1 [INFO] [stdout] | [INFO] [stdout] 10 | pub unsafe fn new(env: Env, len: usize) -> Result { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::write_bytes` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | std::ptr::write_bytes(bytes, 0, len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::create_buffer` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:21:18 [INFO] [stdout] | [INFO] [stdout] 21 | let status = napi::create_buffer(env, len, bytes.as_mut_ptr(), buf.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | pub unsafe fn uninitialized(env: Env, len: usize) -> Result<(Local, *mut u8), napi::Status> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:9 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:29:28 [INFO] [stdout] | [INFO] [stdout] 29 | Ok((buf.assume_init(), bytes.assume_init().cast())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:71:9 [INFO] [stdout] | [INFO] [stdout] 71 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:66:1 [INFO] [stdout] | [INFO] [stdout] 66 | pub unsafe fn as_mut_slice<'a>(env: Env, buf: Local) -> &'a mut [u8] { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:5 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:79:31 [INFO] [stdout] | [INFO] [stdout] 79 | slice::from_raw_parts_mut(data.assume_init().cast(), size) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_buffer_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/buffer.rs:89:9 [INFO] [stdout] | [INFO] [stdout] 89 | napi::get_buffer_info(env, buf, data.as_mut_ptr(), &mut size as *mut _), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/buffer.rs:84:1 [INFO] [stdout] | [INFO] [stdout] 84 | pub unsafe fn size(env: Env, buf: Local) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_new_target` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:36:18 [INFO] [stdout] | [INFO] [stdout] 36 | let status = napi::get_new_target(env, info, target.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub unsafe fn is_construct(env: Env, info: FunctionCallbackInfo) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:41:25 [INFO] [stdout] | [INFO] [stdout] 41 | let target: Local = target.assume_init(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:50:18 [INFO] [stdout] | [INFO] [stdout] 50 | let status = napi::get_cb_info(env, info, null_mut(), null_mut(), out as *mut _, null_mut()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:49:1 [INFO] [stdout] | [INFO] [stdout] 49 | pub unsafe fn this(env: Env, info: FunctionCallbackInfo, out: &mut Local) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:58:18 [INFO] [stdout] | [INFO] [stdout] 58 | let status = napi::get_cb_info( [INFO] [stdout] | __________________^ [INFO] [stdout] 59 | | env, [INFO] [stdout] 60 | | info, [INFO] [stdout] 61 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 64 | | null_mut(), [INFO] [stdout] 65 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:56:1 [INFO] [stdout] | [INFO] [stdout] 56 | pub unsafe fn len(env: Env, info: FunctionCallbackInfo) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | / napi::get_cb_info( [INFO] [stdout] 80 | | env, [INFO] [stdout] 81 | | info, [INFO] [stdout] 82 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 85 | | null_mut(), [INFO] [stdout] 86 | | ), [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/call.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | pub unsafe fn argv(env: Env, info: FunctionCallbackInfo) -> Arguments { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::get_cb_info` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:96:13 [INFO] [stdout] | [INFO] [stdout] 96 | / napi::get_cb_info( [INFO] [stdout] 97 | | env, [INFO] [stdout] 98 | | info, [INFO] [stdout] 99 | | &mut argc as *mut _, [INFO] [stdout] ... | [INFO] [stdout] 102 | | null_mut(), [INFO] [stdout] 103 | | ), [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::vec::Vec::::set_len` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:108:9 [INFO] [stdout] | [INFO] [stdout] 108 | argv.set_len(argc); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/call.rs:113:36 [INFO] [stdout] | [INFO] [stdout] 113 | SmallVec::from_buf_and_len(argv.assume_init(), argc) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::coerce_to_string` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/convert.rs:7:18 [INFO] [stdout] | [INFO] [stdout] 7 | let status = napi::coerce_to_string(env, value, out as *mut _); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/convert.rs:6:1 [INFO] [stdout] | [INFO] [stdout] 6 | pub unsafe fn to_string(out: &mut Local, env: Env, value: Local) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `sys::bindings::functions::napi1::is_exception_pending` is unsafe and requires unsafe block [INFO] [stdout] --> src/sys/error.rs:11:18 [INFO] [stdout] | [INFO] [stdout] 11 | let status = napi::is_exception_pending(env, b.as_mut_ptr()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/sys/error.rs:8:1 [INFO] [stdout] | [INFO] [stdout] 8 | pub unsafe fn is_throwing(env: Env) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::MaybeUninit::::assume_init` is unsafe and requires unsafe block [WARN] too many lines in the log, truncating it