[INFO] fetching crate tree-sitter-c2rust 0.22.6... [INFO] checking tree-sitter-c2rust-0.22.6 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate tree-sitter-c2rust 0.22.6 into /workspace/builds/worker-7-tc2/source [INFO] validating manifest of crates.io crate tree-sitter-c2rust 0.22.6 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate tree-sitter-c2rust 0.22.6 [INFO] finished tweaking crates.io crate tree-sitter-c2rust 0.22.6 [INFO] tweaked toml for crates.io crate tree-sitter-c2rust 0.22.6 written to /workspace/builds/worker-7-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 101 packages to latest compatible versions [INFO] [stderr] Adding c2rust-bitfields v0.3.0 (available: v0.19.0) [INFO] [stderr] Adding c2rust-bitfields-derive v0.2.1 (available: v0.19.0) [INFO] [stderr] Adding cranelift-bforest v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen-meta v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-codegen-shared v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-control v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-entity v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-frontend v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-isle v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-native v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding cranelift-wasm v0.106.2 (available: v0.112.1) [INFO] [stderr] Adding gimli v0.28.1 (available: v0.31.0) [INFO] [stderr] Adding hashbrown v0.13.2 (available: v0.14.5) [INFO] [stderr] Adding itertools v0.12.1 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding object v0.32.2 (available: v0.36.4) [INFO] [stderr] Adding regalloc2 v0.9.3 (available: v0.10.2) [INFO] [stderr] Adding rustc-hash v1.1.0 (available: v2.0.0) [INFO] [stderr] Adding syn v1.0.109 (available: v2.0.77) [INFO] [stderr] Adding wasm-encoder v0.201.0 (available: v0.217.0) [INFO] [stderr] Adding wasmparser v0.201.0 (available: v0.217.0) [INFO] [stderr] Adding wasmtime v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-asm-macros v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-c-api-impl v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-c-api-macros v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-cranelift v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-environ v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-jit-icache-coherence v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-runtime v19.0.2 (available: v20.0.2) [INFO] [stderr] Adding wasmtime-slab v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-types v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-versioned-export-macros v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding wasmtime-wmemcheck v19.0.2 (available: v25.0.1) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] fb716b507ef45b713254d60fb6c680b6bda4378923d01104fcf9bd03bda89f1d [INFO] running `Command { std: "docker" "start" "-a" "fb716b507ef45b713254d60fb6c680b6bda4378923d01104fcf9bd03bda89f1d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "fb716b507ef45b713254d60fb6c680b6bda4378923d01104fcf9bd03bda89f1d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "fb716b507ef45b713254d60fb6c680b6bda4378923d01104fcf9bd03bda89f1d", kill_on_drop: false }` [INFO] [stdout] fb716b507ef45b713254d60fb6c680b6bda4378923d01104fcf9bd03bda89f1d [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 7f69b3c852601206fe79e0c77c3d14eebdc4f16ebc46cc24267257691e02501f [INFO] running `Command { std: "docker" "start" "-a" "7f69b3c852601206fe79e0c77c3d14eebdc4f16ebc46cc24267257691e02501f", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Fixed Cargo.toml (3 fixes) [INFO] [stderr] Checking memchr v2.7.4 [INFO] [stderr] Checking regex-syntax v0.8.4 [INFO] [stderr] Compiling tree-sitter-c2rust v0.22.6 (/tmp/fixit) [INFO] [stderr] Compiling syn v1.0.109 [INFO] [stderr] Migrating binding_rust/build.rs from 2021 edition to 2024 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Compiling c2rust-bitfields-derive v0.2.1 [INFO] [stderr] Checking c2rust-bitfields v0.3.0 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Migrating binding_rust/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `tree_sitter_c2rust` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * binding_rust/core_wrapper/core/lexer.rs [INFO] [stderr] * binding_rust/core_wrapper/core/subtree.rs [INFO] [stderr] * binding_rust/core_wrapper/util.rs [INFO] [stderr] * binding_rust/ffi.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> binding_rust/core_wrapper/util.rs:181:6 [INFO] [stderr] | [INFO] [stderr] 181 | ($counter:expr_2021, $args:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> binding_rust/core_wrapper/util.rs:181:26 [INFO] [stderr] | [INFO] [stderr] 181 | ($counter:expr_2021, $args:expr_2021) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> binding_rust/core_wrapper/util.rs:219:6 [INFO] [stderr] | [INFO] [stderr] 219 | ($string:expr_2021, $size:expr_2021, $($arg:tt)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> binding_rust/core_wrapper/util.rs:219:25 [INFO] [stderr] | [INFO] [stderr] 219 | ($string:expr_2021, $size:expr_2021, $($arg:tt)*) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> binding_rust/core_wrapper/util.rs:239:6 [INFO] [stderr] | [INFO] [stderr] 239 | ($to:expr_2021, $($arg:tt)*) => {{ [INFO] [stderr] | ^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: private item shadows public glob re-export [INFO] [stderr] --> binding_rust/ffi.rs:10:15 [INFO] [stderr] | [INFO] [stderr] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] note: the name `LookaheadIterator` in the type namespace is supposed to be publicly re-exported here [INFO] [stderr] --> binding_rust/ffi.rs:5:9 [INFO] [stderr] | [INFO] [stderr] 5 | pub use crate::core::*; [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] note: but the private item here shadows it [INFO] [stderr] --> binding_rust/ffi.rs:10:15 [INFO] [stderr] | [INFO] [stderr] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ [INFO] [stderr] = note: `#[warn(hidden_glob_reexports)]` on by default [INFO] [stderr] [INFO] [stderr] warning: private item shadows public glob re-export [INFO] [stderr] --> binding_rust/ffi.rs:10:86 [INFO] [stderr] | [INFO] [stderr] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] note: the name `TreeCursor` in the type namespace is supposed to be publicly re-exported here [INFO] [stderr] --> binding_rust/ffi.rs:5:9 [INFO] [stderr] | [INFO] [stderr] 5 | pub use crate::core::*; [INFO] [stderr] | ^^^^^^^^^^^^^^ [INFO] [stderr] note: but the private item here shadows it [INFO] [stderr] --> binding_rust/ffi.rs:10:86 [INFO] [stderr] | [INFO] [stderr] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stderr] | ^^^^^^^^^^ [INFO] [stderr] [INFO] [stderr] warning: creating a shared reference to mutable static is discouraged [INFO] [stderr] --> binding_rust/core_wrapper/core/lexer.rs:615:18 [INFO] [stderr] | [INFO] [stderr] 615 | ranges = &DEFAULT_RANGE; [INFO] [stderr] | ^^^^^^^^^^^^^^ shared reference to mutable static [INFO] [stderr] | [INFO] [stderr] = note: for more information, see issue #114447 [INFO] [stderr] = note: this will be a hard error in the 2024 edition [INFO] [stderr] = note: this shared reference has lifetime `'static`, but if the static ever gets mutated, or a mutable reference is created, then any further use of this shared reference is Undefined Behavior [INFO] [stderr] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stderr] help: use `addr_of!` instead to create a raw pointer [INFO] [stderr] | [INFO] [stderr] 615 | ranges = addr_of!(DEFAULT_RANGE); [INFO] [stderr] | ~~~~~~~~~ + [INFO] [stderr] [INFO] [stderr] warning: creating a shared reference to mutable static is discouraged [INFO] [stderr] --> binding_rust/core_wrapper/core/subtree.rs:2441:16 [INFO] [stderr] | [INFO] [stderr] 2441 | return &empty_state; [INFO] [stderr] | ^^^^^^^^^^^^ shared reference to mutable static [INFO] [stderr] | [INFO] [stderr] = note: for more information, see issue #114447 [INFO] [stderr] = note: this will be a hard error in the 2024 edition [INFO] [stderr] = note: this shared reference has lifetime `'static`, but if the static ever gets mutated, or a mutable reference is created, then any further use of this shared reference is Undefined Behavior [INFO] [stderr] help: use `addr_of!` instead to create a raw pointer [INFO] [stderr] | [INFO] [stderr] 2441 | return addr_of!(empty_state); [INFO] [stderr] | ~~~~~~~~~ + [INFO] [stderr] [INFO] [stderr] error: aborting due to 5 previous errors; 4 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:336:3 [INFO] [stdout] | [INFO] [stdout] 336 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 336 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:357:3 [INFO] [stdout] | [INFO] [stdout] 357 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 357 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:819:3 [INFO] [stdout] | [INFO] [stdout] 819 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 819 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:257:3 [INFO] [stdout] | [INFO] [stdout] 257 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 257 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:264:3 [INFO] [stdout] | [INFO] [stdout] 264 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 264 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:270:3 [INFO] [stdout] | [INFO] [stdout] 270 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 270 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:274:3 [INFO] [stdout] | [INFO] [stdout] 274 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 274 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:278:3 [INFO] [stdout] | [INFO] [stdout] 278 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 278 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:282:3 [INFO] [stdout] | [INFO] [stdout] 282 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 282 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:286:3 [INFO] [stdout] | [INFO] [stdout] 286 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 286 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:313:3 [INFO] [stdout] | [INFO] [stdout] 313 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 313 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:342:3 [INFO] [stdout] | [INFO] [stdout] 342 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 342 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:352:3 [INFO] [stdout] | [INFO] [stdout] 352 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 352 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:383:3 [INFO] [stdout] | [INFO] [stdout] 383 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 383 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:400:3 [INFO] [stdout] | [INFO] [stdout] 400 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 400 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:433:3 [INFO] [stdout] | [INFO] [stdout] 433 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 433 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:459:3 [INFO] [stdout] | [INFO] [stdout] 459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:488:3 [INFO] [stdout] | [INFO] [stdout] 488 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 488 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:502:3 [INFO] [stdout] | [INFO] [stdout] 502 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 502 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:506:3 [INFO] [stdout] | [INFO] [stdout] 506 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 506 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:518:3 [INFO] [stdout] | [INFO] [stdout] 518 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 518 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:525:3 [INFO] [stdout] | [INFO] [stdout] 525 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 525 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:538:3 [INFO] [stdout] | [INFO] [stdout] 538 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 538 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:543:3 [INFO] [stdout] | [INFO] [stdout] 543 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 543 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:470:3 [INFO] [stdout] | [INFO] [stdout] 470 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 470 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:540:3 [INFO] [stdout] | [INFO] [stdout] 540 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 540 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:544:3 [INFO] [stdout] | [INFO] [stdout] 544 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 544 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:556:3 [INFO] [stdout] | [INFO] [stdout] 556 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 556 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:576:3 [INFO] [stdout] | [INFO] [stdout] 576 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 576 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:598:3 [INFO] [stdout] | [INFO] [stdout] 598 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 598 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:604:3 [INFO] [stdout] | [INFO] [stdout] 604 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 604 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:608:3 [INFO] [stdout] | [INFO] [stdout] 608 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 608 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:643:3 [INFO] [stdout] | [INFO] [stdout] 643 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 643 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:310:3 [INFO] [stdout] | [INFO] [stdout] 310 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 310 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:340:3 [INFO] [stdout] | [INFO] [stdout] 340 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 340 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:344:3 [INFO] [stdout] | [INFO] [stdout] 344 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 344 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:783:3 [INFO] [stdout] | [INFO] [stdout] 783 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 783 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:788:3 [INFO] [stdout] | [INFO] [stdout] 788 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 788 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:795:3 [INFO] [stdout] | [INFO] [stdout] 795 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 795 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:803:3 [INFO] [stdout] | [INFO] [stdout] 803 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 803 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:811:3 [INFO] [stdout] | [INFO] [stdout] 811 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 811 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:815:3 [INFO] [stdout] | [INFO] [stdout] 815 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 815 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:819:3 [INFO] [stdout] | [INFO] [stdout] 819 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 819 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:824:3 [INFO] [stdout] | [INFO] [stdout] 824 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 824 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:835:3 [INFO] [stdout] | [INFO] [stdout] 835 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 835 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:839:3 [INFO] [stdout] | [INFO] [stdout] 839 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 839 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:843:3 [INFO] [stdout] | [INFO] [stdout] 843 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 843 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:847:3 [INFO] [stdout] | [INFO] [stdout] 847 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 847 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:856:3 [INFO] [stdout] | [INFO] [stdout] 856 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 856 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:860:3 [INFO] [stdout] | [INFO] [stdout] 860 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 860 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:864:3 [INFO] [stdout] | [INFO] [stdout] 864 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 864 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:868:3 [INFO] [stdout] | [INFO] [stdout] 868 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 868 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:873:3 [INFO] [stdout] | [INFO] [stdout] 873 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 873 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:878:3 [INFO] [stdout] | [INFO] [stdout] 878 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 878 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:882:3 [INFO] [stdout] | [INFO] [stdout] 882 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 882 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:892:3 [INFO] [stdout] | [INFO] [stdout] 892 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 892 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:907:3 [INFO] [stdout] | [INFO] [stdout] 907 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 907 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:935:3 [INFO] [stdout] | [INFO] [stdout] 935 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 935 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:939:3 [INFO] [stdout] | [INFO] [stdout] 939 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 939 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:946:3 [INFO] [stdout] | [INFO] [stdout] 946 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 946 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1086:3 [INFO] [stdout] | [INFO] [stdout] 1086 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1086 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1146:3 [INFO] [stdout] | [INFO] [stdout] 1146 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1146 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1156:3 [INFO] [stdout] | [INFO] [stdout] 1156 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1156 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1168:3 [INFO] [stdout] | [INFO] [stdout] 1168 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1168 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1177:3 [INFO] [stdout] | [INFO] [stdout] 1177 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1177 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1181:3 [INFO] [stdout] | [INFO] [stdout] 1181 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1181 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1185:3 [INFO] [stdout] | [INFO] [stdout] 1185 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1185 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1189:3 [INFO] [stdout] | [INFO] [stdout] 1189 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1189 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1193:3 [INFO] [stdout] | [INFO] [stdout] 1193 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1193 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1200:3 [INFO] [stdout] | [INFO] [stdout] 1200 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1200 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1207:3 [INFO] [stdout] | [INFO] [stdout] 1207 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1207 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1215:3 [INFO] [stdout] | [INFO] [stdout] 1215 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1215 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1223:3 [INFO] [stdout] | [INFO] [stdout] 1223 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1223 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1231:3 [INFO] [stdout] | [INFO] [stdout] 1231 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1231 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/node.rs:1239:3 [INFO] [stdout] | [INFO] [stdout] 1239 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1239 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3552:3 [INFO] [stdout] | [INFO] [stdout] 3552 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3552 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3605:3 [INFO] [stdout] | [INFO] [stdout] 3605 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3605 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3645:3 [INFO] [stdout] | [INFO] [stdout] 3645 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3645 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3649:3 [INFO] [stdout] | [INFO] [stdout] 3649 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3649 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3674:3 [INFO] [stdout] | [INFO] [stdout] 3674 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3674 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3678:3 [INFO] [stdout] | [INFO] [stdout] 3678 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3678 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3682:3 [INFO] [stdout] | [INFO] [stdout] 3682 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3682 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3696:3 [INFO] [stdout] | [INFO] [stdout] 3696 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3696 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3700:3 [INFO] [stdout] | [INFO] [stdout] 3700 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3700 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3707:3 [INFO] [stdout] | [INFO] [stdout] 3707 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3707 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3711:3 [INFO] [stdout] | [INFO] [stdout] 3711 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3711 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3718:3 [INFO] [stdout] | [INFO] [stdout] 3718 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3718 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3726:3 [INFO] [stdout] | [INFO] [stdout] 3726 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3726 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3733:3 [INFO] [stdout] | [INFO] [stdout] 3733 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3733 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:3767:3 [INFO] [stdout] | [INFO] [stdout] 3767 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 3767 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:4022:3 [INFO] [stdout] | [INFO] [stdout] 4022 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4022 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:4031:3 [INFO] [stdout] | [INFO] [stdout] 4031 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4031 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:4063:3 [INFO] [stdout] | [INFO] [stdout] 4063 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4063 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/parser.rs:4071:3 [INFO] [stdout] | [INFO] [stdout] 4071 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4071 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4349:3 [INFO] [stdout] | [INFO] [stdout] 4349 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4349 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4609:3 [INFO] [stdout] | [INFO] [stdout] 4609 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4609 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4642:3 [INFO] [stdout] | [INFO] [stdout] 4642 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4642 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4646:3 [INFO] [stdout] | [INFO] [stdout] 4646 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4646 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4650:3 [INFO] [stdout] | [INFO] [stdout] 4650 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4650 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4654:3 [INFO] [stdout] | [INFO] [stdout] 4654 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4654 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4662:3 [INFO] [stdout] | [INFO] [stdout] 4662 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4662 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4677:3 [INFO] [stdout] | [INFO] [stdout] 4677 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4677 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4685:3 [INFO] [stdout] | [INFO] [stdout] 4685 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4685 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4700:3 [INFO] [stdout] | [INFO] [stdout] 4700 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4700 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4707:3 [INFO] [stdout] | [INFO] [stdout] 4707 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4707 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4725:3 [INFO] [stdout] | [INFO] [stdout] 4725 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4725 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4736:3 [INFO] [stdout] | [INFO] [stdout] 4736 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4736 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4758:3 [INFO] [stdout] | [INFO] [stdout] 4758 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4758 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4778:3 [INFO] [stdout] | [INFO] [stdout] 4778 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4778 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4795:3 [INFO] [stdout] | [INFO] [stdout] 4795 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4795 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4815:3 [INFO] [stdout] | [INFO] [stdout] 4815 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4815 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4883:3 [INFO] [stdout] | [INFO] [stdout] 4883 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4883 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4891:3 [INFO] [stdout] | [INFO] [stdout] 4891 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4891 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4897:3 [INFO] [stdout] | [INFO] [stdout] 4897 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4897 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4901:3 [INFO] [stdout] | [INFO] [stdout] 4901 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4901 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4908:3 [INFO] [stdout] | [INFO] [stdout] 4908 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4908 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4943:3 [INFO] [stdout] | [INFO] [stdout] 4943 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4943 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:4955:3 [INFO] [stdout] | [INFO] [stdout] 4955 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 4955 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:5040:3 [INFO] [stdout] | [INFO] [stdout] 5040 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 5040 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:5065:3 [INFO] [stdout] | [INFO] [stdout] 5065 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 5065 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:5952:3 [INFO] [stdout] | [INFO] [stdout] 5952 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 5952 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:5988:3 [INFO] [stdout] | [INFO] [stdout] 5988 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 5988 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:6030:3 [INFO] [stdout] | [INFO] [stdout] 6030 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 6030 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/query.rs:6145:3 [INFO] [stdout] | [INFO] [stdout] 6145 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 6145 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1034:3 [INFO] [stdout] | [INFO] [stdout] 1034 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1034 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1085:3 [INFO] [stdout] | [INFO] [stdout] 1085 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1085 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1121:3 [INFO] [stdout] | [INFO] [stdout] 1121 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1121 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1125:3 [INFO] [stdout] | [INFO] [stdout] 1125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1138:3 [INFO] [stdout] | [INFO] [stdout] 1138 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1138 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1151:3 [INFO] [stdout] | [INFO] [stdout] 1151 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1151 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1163:3 [INFO] [stdout] | [INFO] [stdout] 1163 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1163 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1183:3 [INFO] [stdout] | [INFO] [stdout] 1183 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1183 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1203:3 [INFO] [stdout] | [INFO] [stdout] 1203 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1203 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1219:3 [INFO] [stdout] | [INFO] [stdout] 1219 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1219 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1257:3 [INFO] [stdout] | [INFO] [stdout] 1257 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1257 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1289:3 [INFO] [stdout] | [INFO] [stdout] 1289 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1289 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1336:3 [INFO] [stdout] | [INFO] [stdout] 1336 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1336 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1403:3 [INFO] [stdout] | [INFO] [stdout] 1403 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1403 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1459:3 [INFO] [stdout] | [INFO] [stdout] 1459 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1459 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1495:3 [INFO] [stdout] | [INFO] [stdout] 1495 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1495 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1507:3 [INFO] [stdout] | [INFO] [stdout] 1507 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1507 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1520:3 [INFO] [stdout] | [INFO] [stdout] 1520 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1520 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1556:3 [INFO] [stdout] | [INFO] [stdout] 1556 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1556 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1576:3 [INFO] [stdout] | [INFO] [stdout] 1576 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1576 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1613:3 [INFO] [stdout] | [INFO] [stdout] 1613 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1613 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1624:3 [INFO] [stdout] | [INFO] [stdout] 1624 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1624 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1657:3 [INFO] [stdout] | [INFO] [stdout] 1657 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1657 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1685:3 [INFO] [stdout] | [INFO] [stdout] 1685 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1685 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1706:3 [INFO] [stdout] | [INFO] [stdout] 1706 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1706 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1715:3 [INFO] [stdout] | [INFO] [stdout] 1715 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1715 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1731:3 [INFO] [stdout] | [INFO] [stdout] 1731 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1731 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1744:3 [INFO] [stdout] | [INFO] [stdout] 1744 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1744 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1757:3 [INFO] [stdout] | [INFO] [stdout] 1757 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1757 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1770:3 [INFO] [stdout] | [INFO] [stdout] 1770 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1770 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1792:3 [INFO] [stdout] | [INFO] [stdout] 1792 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1792 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/stack.rs:1828:3 [INFO] [stdout] | [INFO] [stdout] 1828 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1828 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:654:3 [INFO] [stdout] | [INFO] [stdout] 654 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 654 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:677:3 [INFO] [stdout] | [INFO] [stdout] 677 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 677 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:695:3 [INFO] [stdout] | [INFO] [stdout] 695 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 695 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:703:3 [INFO] [stdout] | [INFO] [stdout] 703 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 703 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:715:3 [INFO] [stdout] | [INFO] [stdout] 715 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 715 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:732:3 [INFO] [stdout] | [INFO] [stdout] 732 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 732 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:758:3 [INFO] [stdout] | [INFO] [stdout] 758 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 758 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:770:3 [INFO] [stdout] | [INFO] [stdout] 770 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 770 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:778:3 [INFO] [stdout] | [INFO] [stdout] 778 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 778 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:802:3 [INFO] [stdout] | [INFO] [stdout] 802 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 802 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:817:3 [INFO] [stdout] | [INFO] [stdout] 817 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 817 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:847:3 [INFO] [stdout] | [INFO] [stdout] 847 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 847 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:908:3 [INFO] [stdout] | [INFO] [stdout] 908 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 908 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:970:3 [INFO] [stdout] | [INFO] [stdout] 970 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 970 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:991:3 [INFO] [stdout] | [INFO] [stdout] 991 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 991 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1019:3 [INFO] [stdout] | [INFO] [stdout] 1019 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1019 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1052:3 [INFO] [stdout] | [INFO] [stdout] 1052 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1052 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1180:3 [INFO] [stdout] | [INFO] [stdout] 1180 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1180 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1256:3 [INFO] [stdout] | [INFO] [stdout] 1256 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1256 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1523:3 [INFO] [stdout] | [INFO] [stdout] 1523 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1523 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1569:3 [INFO] [stdout] | [INFO] [stdout] 1569 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1569 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1584:3 [INFO] [stdout] | [INFO] [stdout] 1584 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1584 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1612:3 [INFO] [stdout] | [INFO] [stdout] 1612 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1612 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1627:3 [INFO] [stdout] | [INFO] [stdout] 1627 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1627 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1694:3 [INFO] [stdout] | [INFO] [stdout] 1694 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1694 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1785:3 [INFO] [stdout] | [INFO] [stdout] 1785 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1785 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:1978:3 [INFO] [stdout] | [INFO] [stdout] 1978 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1978 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2268:3 [INFO] [stdout] | [INFO] [stdout] 2268 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2268 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2303:3 [INFO] [stdout] | [INFO] [stdout] 2303 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2303 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2379:3 [INFO] [stdout] | [INFO] [stdout] 2379 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2379 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2396:3 [INFO] [stdout] | [INFO] [stdout] 2396 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2396 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2444:3 [INFO] [stdout] | [INFO] [stdout] 2444 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2444 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:148:3 [INFO] [stdout] | [INFO] [stdout] 148 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 148 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:173:3 [INFO] [stdout] | [INFO] [stdout] 173 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 173 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:183:3 [INFO] [stdout] | [INFO] [stdout] 183 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 183 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:195:3 [INFO] [stdout] | [INFO] [stdout] 195 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 195 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:204:3 [INFO] [stdout] | [INFO] [stdout] 204 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 204 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:224:3 [INFO] [stdout] | [INFO] [stdout] 224 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 224 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:228:3 [INFO] [stdout] | [INFO] [stdout] 228 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 228 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:284:3 [INFO] [stdout] | [INFO] [stdout] 284 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 284 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree.rs:302:3 [INFO] [stdout] | [INFO] [stdout] 302 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 302 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:633:3 [INFO] [stdout] | [INFO] [stdout] 633 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 633 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:650:3 [INFO] [stdout] | [INFO] [stdout] 650 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 650 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:654:3 [INFO] [stdout] | [INFO] [stdout] 654 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 654 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:683:3 [INFO] [stdout] | [INFO] [stdout] 683 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 683 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:688:3 [INFO] [stdout] | [INFO] [stdout] 688 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 688 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:731:3 [INFO] [stdout] | [INFO] [stdout] 731 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 731 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:741:3 [INFO] [stdout] | [INFO] [stdout] 741 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 741 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:800:3 [INFO] [stdout] | [INFO] [stdout] 800 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 800 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:879:3 [INFO] [stdout] | [INFO] [stdout] 879 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 879 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:892:3 [INFO] [stdout] | [INFO] [stdout] 892 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 892 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:903:3 [INFO] [stdout] | [INFO] [stdout] 903 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 903 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:956:3 [INFO] [stdout] | [INFO] [stdout] 956 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 956 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:972:3 [INFO] [stdout] | [INFO] [stdout] 972 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 972 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:983:3 [INFO] [stdout] | [INFO] [stdout] 983 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 983 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1064:3 [INFO] [stdout] | [INFO] [stdout] 1064 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1064 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1077:3 [INFO] [stdout] | [INFO] [stdout] 1077 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1077 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1090:3 [INFO] [stdout] | [INFO] [stdout] 1090 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1090 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1162:3 [INFO] [stdout] | [INFO] [stdout] 1162 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1162 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1177:3 [INFO] [stdout] | [INFO] [stdout] 1177 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1177 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1211:3 [INFO] [stdout] | [INFO] [stdout] 1211 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1211 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1363:3 [INFO] [stdout] | [INFO] [stdout] 1363 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1363 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1376:3 [INFO] [stdout] | [INFO] [stdout] 1376 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1376 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1417:3 [INFO] [stdout] | [INFO] [stdout] 1417 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1417 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1461:3 [INFO] [stdout] | [INFO] [stdout] 1461 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1461 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1473:3 [INFO] [stdout] | [INFO] [stdout] 1473 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1473 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/tree_cursor.rs:1504:3 [INFO] [stdout] | [INFO] [stdout] 1504 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 1504 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:53:3 [INFO] [stdout] | [INFO] [stdout] 53 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 53 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:55:3 [INFO] [stdout] | [INFO] [stdout] 55 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 55 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:63:3 [INFO] [stdout] | [INFO] [stdout] 63 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 63 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:65:3 [INFO] [stdout] | [INFO] [stdout] 65 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 65 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:72:3 [INFO] [stdout] | [INFO] [stdout] 72 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 72 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:79:3 [INFO] [stdout] | [INFO] [stdout] 79 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 79 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:85:3 [INFO] [stdout] | [INFO] [stdout] 85 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 85 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:91:3 [INFO] [stdout] | [INFO] [stdout] 91 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 91 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:99:3 [INFO] [stdout] | [INFO] [stdout] 99 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 99 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:107:3 [INFO] [stdout] | [INFO] [stdout] 107 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 107 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:115:3 [INFO] [stdout] | [INFO] [stdout] 115 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 115 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:119:3 [INFO] [stdout] | [INFO] [stdout] 119 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 119 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:123:3 [INFO] [stdout] | [INFO] [stdout] 123 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 123 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/core/wasm_store.rs:125:3 [INFO] [stdout] | [INFO] [stdout] 125 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 125 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/mod.rs:48:7 [INFO] [stdout] | [INFO] [stdout] 48 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 48 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/mod.rs:51:7 [INFO] [stdout] | [INFO] [stdout] 51 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 51 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/mod.rs:54:7 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> binding_rust/core_wrapper/mod.rs:58:7 [INFO] [stdout] | [INFO] [stdout] 58 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 58 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:181:15 [INFO] [stdout] | [INFO] [stdout] 181 | ($counter:expr, $args:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 181 | ($counter:expr_2021, $args:expr) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:181:27 [INFO] [stdout] | [INFO] [stdout] 181 | ($counter:expr, $args:expr) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 181 | ($counter:expr, $args:expr_2021) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:219:14 [INFO] [stdout] | [INFO] [stdout] 219 | ($string:expr, $size:expr, $($arg:tt)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 219 | ($string:expr_2021, $size:expr, $($arg:tt)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:219:26 [INFO] [stdout] | [INFO] [stdout] 219 | ($string:expr, $size:expr, $($arg:tt)*) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 219 | ($string:expr, $size:expr_2021, $($arg:tt)*) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:239:10 [INFO] [stdout] | [INFO] [stdout] 239 | ($to:expr, $($arg:tt)*) => {{ [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 239 | ($to:expr_2021, $($arg:tt)*) => {{ [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: private item shadows public glob re-export [INFO] [stdout] --> binding_rust/ffi.rs:10:15 [INFO] [stdout] | [INFO] [stdout] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] note: the name `LookaheadIterator` in the type namespace is supposed to be publicly re-exported here [INFO] [stdout] --> binding_rust/ffi.rs:5:9 [INFO] [stdout] | [INFO] [stdout] 5 | pub use crate::core::*; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] note: but the private item here shadows it [INFO] [stdout] --> binding_rust/ffi.rs:10:15 [INFO] [stdout] | [INFO] [stdout] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(hidden_glob_reexports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: private item shadows public glob re-export [INFO] [stdout] --> binding_rust/ffi.rs:10:86 [INFO] [stdout] | [INFO] [stdout] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] note: the name `TreeCursor` in the type namespace is supposed to be publicly re-exported here [INFO] [stdout] --> binding_rust/ffi.rs:5:9 [INFO] [stdout] | [INFO] [stdout] 5 | pub use crate::core::*; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] note: but the private item here shadows it [INFO] [stdout] --> binding_rust/ffi.rs:10:86 [INFO] [stdout] | [INFO] [stdout] 10 | Language, LookaheadIterator, Node, Parser, Query, QueryCursor, QueryError, Tree, TreeCursor, [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a shared reference to mutable static is discouraged [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:615:18 [INFO] [stdout] | [INFO] [stdout] 615 | ranges = &DEFAULT_RANGE; [INFO] [stdout] | ^^^^^^^^^^^^^^ shared reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this shared reference has lifetime `'static`, but if the static ever gets mutated, or a mutable reference is created, then any further use of this shared reference is Undefined Behavior [INFO] [stdout] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: use `addr_of!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 615 | ranges = addr_of!(DEFAULT_RANGE); [INFO] [stdout] | ~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a shared reference to mutable static is discouraged [INFO] [stdout] --> binding_rust/core_wrapper/core/subtree.rs:2441:16 [INFO] [stdout] | [INFO] [stdout] 2441 | return &empty_state; [INFO] [stdout] | ^^^^^^^^^^^^ shared reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this shared reference has lifetime `'static`, but if the static ever gets mutated, or a mutable reference is created, then any further use of this shared reference is Undefined Behavior [INFO] [stdout] help: use `addr_of!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 2441 | return addr_of!(empty_state); [INFO] [stdout] | ~~~~~~~~~ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:23:18 [INFO] [stdout] | [INFO] [stdout] 23 | let result = alloc::alloc(layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:15:1 [INFO] [stdout] | [INFO] [stdout] 15 | pub(crate) unsafe extern "C" fn ts_malloc(size: usize) -> *mut ffi::c_void { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:28:5 [INFO] [stdout] | [INFO] [stdout] 28 | *(result as *mut Layout) = layout; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:29:5 [INFO] [stdout] | [INFO] [stdout] 29 | (result as *mut u8).offset(offset_data as isize) as *mut ffi::c_void [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:41:18 [INFO] [stdout] | [INFO] [stdout] 41 | let result = alloc::alloc_zeroed(layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:33:1 [INFO] [stdout] | [INFO] [stdout] 33 | pub(crate) unsafe extern "C" fn ts_calloc(count: usize, size: usize) -> *mut ffi::c_void { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:46:5 [INFO] [stdout] | [INFO] [stdout] 46 | *(result as *mut Layout) = layout; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:47:5 [INFO] [stdout] | [INFO] [stdout] 47 | (result as *mut u8).offset(offset_data as isize) as *mut ffi::c_void [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_malloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:56:9 [INFO] [stdout] | [INFO] [stdout] 56 | ts_malloc(size) [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | / pub(crate) unsafe extern "C" fn ts_realloc( [INFO] [stdout] 52 | | buffer: *mut ffi::c_void, [INFO] [stdout] 53 | | size: usize, [INFO] [stdout] 54 | | ) -> *mut ffi::c_void { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_free` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:58:9 [INFO] [stdout] | [INFO] [stdout] 58 | ts_free(buffer); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:65:22 [INFO] [stdout] | [INFO] [stdout] 65 | let buffer = (buffer as *mut u8).offset(-(layout_offset as isize)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:66:22 [INFO] [stdout] | [INFO] [stdout] 66 | let layout = *(buffer as *mut Layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::realloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:72:22 [INFO] [stdout] | [INFO] [stdout] 72 | let result = alloc::realloc(buffer, layout, new_layout.size()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | *(result as *mut Layout) = new_layout; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:78:9 [INFO] [stdout] | [INFO] [stdout] 78 | (result as *mut u8).offset(offset_data as isize) as *mut ffi::c_void [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:92:18 [INFO] [stdout] | [INFO] [stdout] 92 | let buffer = (buffer as *mut u8).offset(-(layout_offset as isize)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:83:1 [INFO] [stdout] | [INFO] [stdout] 83 | pub(crate) unsafe extern "C" fn ts_free(buffer: *mut ffi::c_void) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:93:18 [INFO] [stdout] | [INFO] [stdout] 93 | let layout = *(buffer as *mut Layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/alloc.rs:95:5 [INFO] [stdout] | [INFO] [stdout] 95 | alloc::dealloc(buffer, layout); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:107:17 [INFO] [stdout] | [INFO] [stdout] 107 | let a = *s1; [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:105:1 [INFO] [stdout] | [INFO] [stdout] 105 | pub(crate) unsafe fn strncmp(mut s1: *const c_char, mut s2: *const c_char, mut n: usize) -> c_int { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:108:17 [INFO] [stdout] | [INFO] [stdout] 108 | let b = *s2; [INFO] [stdout] | ^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:120:14 [INFO] [stdout] | [INFO] [stdout] 120 | s1 = s1.add(1); [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:121:14 [INFO] [stdout] | [INFO] [stdout] 121 | s2 = s2.add(1); [INFO] [stdout] | ^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:196:27 [INFO] [stdout] | [INFO] [stdout] 196 | WriteCounter::new(std::slice::from_raw_parts_mut(string as *mut u8, size)), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:190:1 [INFO] [stdout] | [INFO] [stdout] 190 | / pub(crate) unsafe fn snwrite_runtime( [INFO] [stdout] 191 | | string: *mut c_char, [INFO] [stdout] 192 | | size: usize, [INFO] [stdout] 193 | | args: fmt::Arguments, [INFO] [stdout] 194 | | ) -> io::Result { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:309:5 [INFO] [stdout] | [INFO] [stdout] 309 | (*(p as *const AtomicU32)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:308:1 [INFO] [stdout] | [INFO] [stdout] 308 | pub(crate) unsafe extern "C" fn atomic_inc(p: *const u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:316:5 [INFO] [stdout] | [INFO] [stdout] 316 | (*(p as *const AtomicU32)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:315:1 [INFO] [stdout] | [INFO] [stdout] 315 | pub(crate) unsafe extern "C" fn atomic_dec(p: *mut u32) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:335:5 [INFO] [stdout] | [INFO] [stdout] 335 | (*(p as *const AtomicUsize)).load(std::sync::atomic::Ordering::SeqCst) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/util.rs:334:1 [INFO] [stdout] | [INFO] [stdout] 334 | pub(crate) unsafe extern "C" fn atomic_load(p: *const usize) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::point__new` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:99:16 [INFO] [stdout] | [INFO] [stdout] 99 | return point__new((a.row).wrapping_add(b.row), b.column); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:97:1 [INFO] [stdout] | [INFO] [stdout] 97 | unsafe extern "C" fn point_add(mut a: TSPoint, mut b: TSPoint) -> TSPoint { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::point__new` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:101:16 [INFO] [stdout] | [INFO] [stdout] 101 | return point__new(a.row, (a.column).wrapping_add(b.column)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::point_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:128:21 [INFO] [stdout] | [INFO] [stdout] 128 | result.extent = point_add(len1.extent, len2.extent); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:122:1 [INFO] [stdout] | [INFO] [stdout] 122 | unsafe extern "C" fn length_add(mut len1: Length, mut len2: Length) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:154:23 [INFO] [stdout] | [INFO] [stdout] 154 | if new_capacity > (*self_0).capacity { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:149:1 [INFO] [stdout] | [INFO] [stdout] 149 | / unsafe extern "C" fn _array__reserve( [INFO] [stdout] 150 | | mut self_0: *mut Array, [INFO] [stdout] 151 | | mut element_size: size_t, [INFO] [stdout] 152 | | mut new_capacity: uint32_t, [INFO] [stdout] 153 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:155:14 [INFO] [stdout] | [INFO] [stdout] 155 | if !((*self_0).contents).is_null() { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:156:13 [INFO] [stdout] | [INFO] [stdout] 156 | (*self_0).contents = crate::core::alloc::ts_realloc( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_realloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:156:34 [INFO] [stdout] | [INFO] [stdout] 156 | (*self_0).contents = crate::core::alloc::ts_realloc( [INFO] [stdout] | __________________________________^ [INFO] [stdout] 157 | | (*self_0).contents, [INFO] [stdout] 158 | | (new_capacity as libc::c_ulong).wrapping_mul(element_size), [INFO] [stdout] 159 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:157:17 [INFO] [stdout] | [INFO] [stdout] 157 | (*self_0).contents, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:161:13 [INFO] [stdout] | [INFO] [stdout] 161 | (*self_0).contents = crate::core::alloc::ts_malloc( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_malloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:161:34 [INFO] [stdout] | [INFO] [stdout] 161 | (*self_0).contents = crate::core::alloc::ts_malloc( [INFO] [stdout] | __________________________________^ [INFO] [stdout] 162 | | (new_capacity as libc::c_ulong).wrapping_mul(element_size), [INFO] [stdout] 163 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:165:9 [INFO] [stdout] | [INFO] [stdout] 165 | (*self_0).capacity = new_capacity; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:174:35 [INFO] [stdout] | [INFO] [stdout] 174 | let mut new_size: uint32_t = ((*self_0).size).wrapping_add(count); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:169:1 [INFO] [stdout] | [INFO] [stdout] 169 | / unsafe extern "C" fn _array__grow( [INFO] [stdout] 170 | | mut self_0: *mut Array, [INFO] [stdout] 171 | | mut count: uint32_t, [INFO] [stdout] 172 | | mut element_size: size_t, [INFO] [stdout] 173 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:175:19 [INFO] [stdout] | [INFO] [stdout] 175 | if new_size > (*self_0).capacity { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:177:14 [INFO] [stdout] | [INFO] [stdout] 177 | ((*self_0).capacity).wrapping_mul(2 as libc::c_int as libc::c_uint); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::_array__reserve` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:184:9 [INFO] [stdout] | [INFO] [stdout] 184 | _array__reserve(self_0, element_size, new_capacity); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:189:16 [INFO] [stdout] | [INFO] [stdout] 189 | return (if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:188:1 [INFO] [stdout] | [INFO] [stdout] 188 | unsafe extern "C" fn ts_subtree_symbol(mut self_0: Subtree) -> TSSymbol { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:190:9 [INFO] [stdout] | [INFO] [stdout] 190 | self_0.data.symbol as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:192:9 [INFO] [stdout] | [INFO] [stdout] 192 | (*self_0.ptr).symbol as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:192:11 [INFO] [stdout] | [INFO] [stdout] 192 | (*self_0.ptr).symbol as libc::c_int [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:197:15 [INFO] [stdout] | [INFO] [stdout] 197 | return if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:196:1 [INFO] [stdout] | [INFO] [stdout] 196 | unsafe extern "C" fn ts_subtree_visible(mut self_0: Subtree) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:198:9 [INFO] [stdout] | [INFO] [stdout] 198 | (self_0.data).visible() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:200:9 [INFO] [stdout] | [INFO] [stdout] 200 | (*self_0.ptr).visible() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:200:11 [INFO] [stdout] | [INFO] [stdout] 200 | (*self_0.ptr).visible() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:205:15 [INFO] [stdout] | [INFO] [stdout] 205 | return if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:204:1 [INFO] [stdout] | [INFO] [stdout] 204 | unsafe extern "C" fn ts_subtree_extra(mut self_0: Subtree) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:206:9 [INFO] [stdout] | [INFO] [stdout] 206 | (self_0.data).extra() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:208:9 [INFO] [stdout] | [INFO] [stdout] 208 | (*self_0.ptr).extra() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:208:11 [INFO] [stdout] | [INFO] [stdout] 208 | (*self_0.ptr).extra() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:213:15 [INFO] [stdout] | [INFO] [stdout] 213 | return if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:212:1 [INFO] [stdout] | [INFO] [stdout] 212 | unsafe extern "C" fn ts_subtree_has_changes(mut self_0: Subtree) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:214:9 [INFO] [stdout] | [INFO] [stdout] 214 | (self_0.data).has_changes() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:216:9 [INFO] [stdout] | [INFO] [stdout] 216 | (*self_0.ptr).has_changes() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:216:11 [INFO] [stdout] | [INFO] [stdout] 216 | (*self_0.ptr).has_changes() as libc::c_int [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:221:16 [INFO] [stdout] | [INFO] [stdout] 221 | return (if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:220:1 [INFO] [stdout] | [INFO] [stdout] 220 | unsafe extern "C" fn ts_subtree_parse_state(mut self_0: Subtree) -> TSStateId { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:222:9 [INFO] [stdout] | [INFO] [stdout] 222 | self_0.data.parse_state as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:224:9 [INFO] [stdout] | [INFO] [stdout] 224 | (*self_0.ptr).parse_state as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:224:11 [INFO] [stdout] | [INFO] [stdout] 224 | (*self_0.ptr).parse_state as libc::c_int [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:229:8 [INFO] [stdout] | [INFO] [stdout] 229 | if (self_0.data).is_inline() { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:228:1 [INFO] [stdout] | [INFO] [stdout] 228 | unsafe extern "C" fn ts_subtree_padding(mut self_0: Subtree) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:232:24 [INFO] [stdout] | [INFO] [stdout] 232 | bytes: self_0.data.padding_bytes as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:235:30 [INFO] [stdout] | [INFO] [stdout] 235 | row: (self_0.data).padding_rows() as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:236:33 [INFO] [stdout] | [INFO] [stdout] 236 | column: self_0.data.padding_columns as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:245:16 [INFO] [stdout] | [INFO] [stdout] 245 | return (*self_0.ptr).padding; [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:245:18 [INFO] [stdout] | [INFO] [stdout] 245 | return (*self_0.ptr).padding; [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:250:8 [INFO] [stdout] | [INFO] [stdout] 250 | if (self_0.data).is_inline() { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:249:1 [INFO] [stdout] | [INFO] [stdout] 249 | unsafe extern "C" fn ts_subtree_size(mut self_0: Subtree) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:253:24 [INFO] [stdout] | [INFO] [stdout] 253 | bytes: self_0.data.size_bytes as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:257:33 [INFO] [stdout] | [INFO] [stdout] 257 | column: self_0.data.size_bytes as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:266:16 [INFO] [stdout] | [INFO] [stdout] 266 | return (*self_0.ptr).size; [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:266:18 [INFO] [stdout] | [INFO] [stdout] 266 | return (*self_0.ptr).size; [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:271:12 [INFO] [stdout] | [INFO] [stdout] 271 | return length_add(ts_subtree_padding(self_0), ts_subtree_size(self_0)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:270:1 [INFO] [stdout] | [INFO] [stdout] 270 | unsafe extern "C" fn ts_subtree_total_size(mut self_0: Subtree) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_padding` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:271:23 [INFO] [stdout] | [INFO] [stdout] 271 | return length_add(ts_subtree_padding(self_0), ts_subtree_size(self_0)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:271:51 [INFO] [stdout] | [INFO] [stdout] 271 | return length_add(ts_subtree_padding(self_0), ts_subtree_size(self_0)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:275:15 [INFO] [stdout] | [INFO] [stdout] 275 | return if (self_0.data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:274:1 [INFO] [stdout] | [INFO] [stdout] 274 | unsafe extern "C" fn ts_subtree_child_count(mut self_0: Subtree) -> uint32_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:278:9 [INFO] [stdout] | [INFO] [stdout] 278 | (*self_0.ptr).child_count [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:278:11 [INFO] [stdout] | [INFO] [stdout] 278 | (*self_0.ptr).child_count [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:288:9 [INFO] [stdout] | [INFO] [stdout] 288 | / *((*self_0).alias_sequences).offset( [INFO] [stdout] 289 | | production_id [INFO] [stdout] 290 | | .wrapping_mul((*self_0).max_alias_sequence_length as libc::c_uint) [INFO] [stdout] 291 | | .wrapping_add(child_index) as isize, [INFO] [stdout] 292 | | ) as libc::c_int [INFO] [stdout] | |_________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:282:1 [INFO] [stdout] | [INFO] [stdout] 282 | / unsafe extern "C" fn ts_language_alias_at( [INFO] [stdout] 283 | | mut self_0: *const TSLanguage, [INFO] [stdout] 284 | | mut production_id: uint32_t, [INFO] [stdout] 285 | | mut child_index: uint32_t, [INFO] [stdout] 286 | | ) -> TSSymbol { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:288:10 [INFO] [stdout] | [INFO] [stdout] 288 | *((*self_0).alias_sequences).offset( [INFO] [stdout] | __________^ [INFO] [stdout] 289 | | production_id [INFO] [stdout] 290 | | .wrapping_mul((*self_0).max_alias_sequence_length as libc::c_uint) [INFO] [stdout] 291 | | .wrapping_add(child_index) as isize, [INFO] [stdout] 292 | | ) as libc::c_int [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:288:11 [INFO] [stdout] | [INFO] [stdout] 288 | *((*self_0).alias_sequences).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:290:31 [INFO] [stdout] | [INFO] [stdout] 290 | .wrapping_mul((*self_0).max_alias_sequence_length as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:302:8 [INFO] [stdout] | [INFO] [stdout] 302 | if (*self_0).size > 0 as libc::c_int as libc::c_uint { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:297:1 [INFO] [stdout] | [INFO] [stdout] 297 | / unsafe extern "C" fn ts_range_array_add( [INFO] [stdout] 298 | | mut self_0: *mut TSRangeArray, [INFO] [stdout] 299 | | mut start: Length, [INFO] [stdout] 300 | | mut end: Length, [INFO] [stdout] 301 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:303:13 [INFO] [stdout] | [INFO] [stdout] 303 | if ((*self_0).size).wrapping_sub(1 as libc::c_int as libc::c_uint) < (*self_0).size { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:303:78 [INFO] [stdout] | [INFO] [stdout] 303 | if ((*self_0).size).wrapping_sub(1 as libc::c_int as libc::c_uint) < (*self_0).size { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:307:49 [INFO] [stdout] | [INFO] [stdout] 307 | let mut last_range: *mut TSRange = &mut *((*self_0).contents) [INFO] [stdout] | _________________________________________________^ [INFO] [stdout] 308 | | .offset(((*self_0).size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize) [INFO] [stdout] | |_____________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:307:50 [INFO] [stdout] | [INFO] [stdout] 307 | let mut last_range: *mut TSRange = &mut *((*self_0).contents) [INFO] [stdout] | __________________________________________________^ [INFO] [stdout] 308 | | .offset(((*self_0).size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize) [INFO] [stdout] | |_____________________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:307:51 [INFO] [stdout] | [INFO] [stdout] 307 | let mut last_range: *mut TSRange = &mut *((*self_0).contents) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:308:22 [INFO] [stdout] | [INFO] [stdout] 308 | .offset(((*self_0).size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:310:27 [INFO] [stdout] | [INFO] [stdout] 310 | if start.bytes <= (*last_range).end_byte { [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:311:13 [INFO] [stdout] | [INFO] [stdout] 311 | (*last_range).end_byte = end.bytes; [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:312:13 [INFO] [stdout] | [INFO] [stdout] 312 | (*last_range).end_point = end.extent; [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::_array__grow` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:326:9 [INFO] [stdout] | [INFO] [stdout] 326 | / _array__grow( [INFO] [stdout] 327 | | self_0 as *mut Array, [INFO] [stdout] 328 | | 1 as libc::c_int as uint32_t, [INFO] [stdout] 329 | | ::core::mem::size_of::() as libc::c_ulong, [INFO] [stdout] 330 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:331:22 [INFO] [stdout] | [INFO] [stdout] 331 | let fresh0 = (*self_0).size; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:332:9 [INFO] [stdout] | [INFO] [stdout] 332 | (*self_0).size = ((*self_0).size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:332:27 [INFO] [stdout] | [INFO] [stdout] 332 | (*self_0).size = ((*self_0).size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:333:9 [INFO] [stdout] | [INFO] [stdout] 333 | *((*self_0).contents).offset(fresh0 as isize) = range; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:333:10 [INFO] [stdout] | [INFO] [stdout] 333 | *((*self_0).contents).offset(fresh0 as isize) = range; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:333:11 [INFO] [stdout] | [INFO] [stdout] 333 | *((*self_0).contents).offset(fresh0 as isize) = range; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:344:15 [INFO] [stdout] | [INFO] [stdout] 344 | while i < (*self_0).size { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:337:1 [INFO] [stdout] | [INFO] [stdout] 337 | / pub unsafe extern "C" fn ts_range_array_intersects( [INFO] [stdout] 338 | | mut self_0: *const TSRangeArray, [INFO] [stdout] 339 | | mut start_index: libc::c_uint, [INFO] [stdout] 340 | | mut start_byte: uint32_t, [INFO] [stdout] 341 | | mut end_byte: uint32_t, [INFO] [stdout] 342 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:345:44 [INFO] [stdout] | [INFO] [stdout] 345 | let mut range: *mut TSRange = &mut *((*self_0).contents).offset(i as isize) as *mut TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:345:45 [INFO] [stdout] | [INFO] [stdout] 345 | let mut range: *mut TSRange = &mut *((*self_0).contents).offset(i as isize) as *mut TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:345:46 [INFO] [stdout] | [INFO] [stdout] 345 | let mut range: *mut TSRange = &mut *((*self_0).contents).offset(i as isize) as *mut TSRange; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:346:12 [INFO] [stdout] | [INFO] [stdout] 346 | if (*range).end_byte > start_byte { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:347:16 [INFO] [stdout] | [INFO] [stdout] 347 | if (*range).start_byte >= end_byte { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_zero` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:367:40 [INFO] [stdout] | [INFO] [stdout] 367 | let mut current_position: Length = length_zero(); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:358:1 [INFO] [stdout] | [INFO] [stdout] 358 | / pub unsafe extern "C" fn ts_range_array_get_changed_ranges( [INFO] [stdout] 359 | | mut old_ranges: *const TSRange, [INFO] [stdout] 360 | | mut old_range_count: libc::c_uint, [INFO] [stdout] 361 | | mut new_ranges: *const TSRange, [INFO] [stdout] 362 | | mut new_range_count: libc::c_uint, [INFO] [stdout] 363 | | mut differences: *mut TSRangeArray, [INFO] [stdout] 364 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:372:14 [INFO] [stdout] | [INFO] [stdout] 372 | &*old_ranges.offset(old_index as isize) as *const TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:372:15 [INFO] [stdout] | [INFO] [stdout] 372 | &*old_ranges.offset(old_index as isize) as *const TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:374:14 [INFO] [stdout] | [INFO] [stdout] 374 | &*new_ranges.offset(new_index as isize) as *const TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:374:15 [INFO] [stdout] | [INFO] [stdout] 374 | &*new_ranges.offset(new_index as isize) as *const TSRange; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:382:28 [INFO] [stdout] | [INFO] [stdout] 382 | bytes: (*old_range).end_byte, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:383:29 [INFO] [stdout] | [INFO] [stdout] 383 | extent: (*old_range).end_point, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:390:28 [INFO] [stdout] | [INFO] [stdout] 390 | bytes: (*old_range).start_byte, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:391:29 [INFO] [stdout] | [INFO] [stdout] 391 | extent: (*old_range).start_point, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:396:33 [INFO] [stdout] | [INFO] [stdout] 396 | next_old_position = LENGTH_MAX; [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:405:28 [INFO] [stdout] | [INFO] [stdout] 405 | bytes: (*new_range).end_byte, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:406:29 [INFO] [stdout] | [INFO] [stdout] 406 | extent: (*new_range).end_point, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:413:28 [INFO] [stdout] | [INFO] [stdout] 413 | bytes: (*new_range).start_byte, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:414:29 [INFO] [stdout] | [INFO] [stdout] 414 | extent: (*new_range).start_point, [INFO] [stdout] | ^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:419:33 [INFO] [stdout] | [INFO] [stdout] 419 | next_new_position = LENGTH_MAX; [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:423:17 [INFO] [stdout] | [INFO] [stdout] 423 | ts_range_array_add(differences, current_position, next_old_position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:432:17 [INFO] [stdout] | [INFO] [stdout] 432 | ts_range_array_add(differences, current_position, next_new_position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:441:17 [INFO] [stdout] | [INFO] [stdout] 441 | ts_range_array_add(differences, current_position, next_new_position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:460:5 [INFO] [stdout] | [INFO] [stdout] 460 | (*cursor).stack.size = 0 as libc::c_int as uint32_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:455:1 [INFO] [stdout] | [INFO] [stdout] 455 | / unsafe extern "C" fn iterator_new( [INFO] [stdout] 456 | | mut cursor: *mut TreeCursor, [INFO] [stdout] 457 | | mut tree: *const Subtree, [INFO] [stdout] 458 | | mut language: *const TSLanguage, [INFO] [stdout] 459 | | ) -> Iterator_0 { [INFO] [stdout] | |_______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::_array__grow` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:461:5 [INFO] [stdout] | [INFO] [stdout] 461 | / _array__grow( [INFO] [stdout] 462 | | &mut (*cursor).stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] 463 | | 1 as libc::c_int as uint32_t, [INFO] [stdout] 464 | | ::core::mem::size_of::() as libc::c_ulong, [INFO] [stdout] 465 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:462:14 [INFO] [stdout] | [INFO] [stdout] 462 | &mut (*cursor).stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:466:18 [INFO] [stdout] | [INFO] [stdout] 466 | let fresh1 = (*cursor).stack.size; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:467:5 [INFO] [stdout] | [INFO] [stdout] 467 | (*cursor).stack.size = ((*cursor).stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:467:29 [INFO] [stdout] | [INFO] [stdout] 467 | (*cursor).stack.size = ((*cursor).stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:468:5 [INFO] [stdout] | [INFO] [stdout] 468 | *((*cursor).stack.contents).offset(fresh1 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:468:6 [INFO] [stdout] | [INFO] [stdout] 468 | *((*cursor).stack.contents).offset(fresh1 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:468:7 [INFO] [stdout] | [INFO] [stdout] 468 | *((*cursor).stack.contents).offset(fresh1 as isize) = { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_zero` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:471:23 [INFO] [stdout] | [INFO] [stdout] 471 | position: length_zero(), [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:480:21 [INFO] [stdout] | [INFO] [stdout] 480 | cursor: *cursor, [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:489:12 [INFO] [stdout] | [INFO] [stdout] 489 | return (*self_0).cursor.stack.size == 0 as libc::c_int as libc::c_uint; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:488:1 [INFO] [stdout] | [INFO] [stdout] 488 | unsafe extern "C" fn iterator_done(mut self_0: *mut Iterator_0) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:492:9 [INFO] [stdout] | [INFO] [stdout] 492 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:491:1 [INFO] [stdout] | [INFO] [stdout] 491 | unsafe extern "C" fn iterator_start_position(mut self_0: *mut Iterator_0) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:493:11 [INFO] [stdout] | [INFO] [stdout] 493 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:498:38 [INFO] [stdout] | [INFO] [stdout] 498 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________^ [INFO] [stdout] 499 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 500 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |______________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:498:45 [INFO] [stdout] | [INFO] [stdout] 498 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | _____________________________________________^ [INFO] [stdout] 499 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 500 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:498:46 [INFO] [stdout] | [INFO] [stdout] 498 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________________^ [INFO] [stdout] 499 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 500 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:498:47 [INFO] [stdout] | [INFO] [stdout] 498 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:499:10 [INFO] [stdout] | [INFO] [stdout] 499 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:501:8 [INFO] [stdout] | [INFO] [stdout] 501 | if (*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:504:16 [INFO] [stdout] | [INFO] [stdout] 504 | return length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_padding` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:504:43 [INFO] [stdout] | [INFO] [stdout] 504 | return length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:504:62 [INFO] [stdout] | [INFO] [stdout] 504 | return length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:508:9 [INFO] [stdout] | [INFO] [stdout] 508 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:507:1 [INFO] [stdout] | [INFO] [stdout] 507 | unsafe extern "C" fn iterator_end_position(mut self_0: *mut Iterator_0) -> Length { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:509:11 [INFO] [stdout] | [INFO] [stdout] 509 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:514:38 [INFO] [stdout] | [INFO] [stdout] 514 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________^ [INFO] [stdout] 515 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 516 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |______________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:514:45 [INFO] [stdout] | [INFO] [stdout] 514 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | _____________________________________________^ [INFO] [stdout] 515 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 516 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:514:46 [INFO] [stdout] | [INFO] [stdout] 514 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________________^ [INFO] [stdout] 515 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 516 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:514:47 [INFO] [stdout] | [INFO] [stdout] 514 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:515:10 [INFO] [stdout] | [INFO] [stdout] 515 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:517:30 [INFO] [stdout] | [INFO] [stdout] 517 | let mut result: Length = length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_padding` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:517:57 [INFO] [stdout] | [INFO] [stdout] 517 | let mut result: Length = length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:517:76 [INFO] [stdout] | [INFO] [stdout] 517 | let mut result: Length = length_add(entry.position, ts_subtree_padding(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:518:8 [INFO] [stdout] | [INFO] [stdout] 518 | if (*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:521:16 [INFO] [stdout] | [INFO] [stdout] 521 | return length_add(result, ts_subtree_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:521:35 [INFO] [stdout] | [INFO] [stdout] 521 | return length_add(result, ts_subtree_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:521:51 [INFO] [stdout] | [INFO] [stdout] 521 | return length_add(result, ts_subtree_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:525:9 [INFO] [stdout] | [INFO] [stdout] 525 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:524:1 [INFO] [stdout] | [INFO] [stdout] 524 | unsafe extern "C" fn iterator_tree_is_visible(mut self_0: *const Iterator_0) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:526:11 [INFO] [stdout] | [INFO] [stdout] 526 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:531:38 [INFO] [stdout] | [INFO] [stdout] 531 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________^ [INFO] [stdout] 532 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 533 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |______________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:531:45 [INFO] [stdout] | [INFO] [stdout] 531 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | _____________________________________________^ [INFO] [stdout] 532 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 533 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:531:46 [INFO] [stdout] | [INFO] [stdout] 531 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________________^ [INFO] [stdout] 532 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 533 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:531:47 [INFO] [stdout] | [INFO] [stdout] 531 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:532:10 [INFO] [stdout] | [INFO] [stdout] 532 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:534:8 [INFO] [stdout] | [INFO] [stdout] 534 | if ts_subtree_visible(*entry.subtree) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:534:27 [INFO] [stdout] | [INFO] [stdout] 534 | if ts_subtree_visible(*entry.subtree) { [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:537:8 [INFO] [stdout] | [INFO] [stdout] 537 | if (*self_0).cursor.stack.size > 1 as libc::c_int as libc::c_uint { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:538:35 [INFO] [stdout] | [INFO] [stdout] 538 | let mut parent: Subtree = *(*((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ___________________________________^ [INFO] [stdout] 539 | | ((*self_0).cursor.stack.size).wrapping_sub(2 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 540 | | )) [INFO] [stdout] 541 | | .subtree; [INFO] [stdout] | |________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:538:36 [INFO] [stdout] | [INFO] [stdout] 538 | let mut parent: Subtree = *(*((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ____________________________________^ [INFO] [stdout] 539 | | ((*self_0).cursor.stack.size).wrapping_sub(2 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 540 | | )) [INFO] [stdout] | |__________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:538:38 [INFO] [stdout] | [INFO] [stdout] 538 | let mut parent: Subtree = *(*((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ______________________________________^ [INFO] [stdout] 539 | | ((*self_0).cursor.stack.size).wrapping_sub(2 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 540 | | )) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:538:39 [INFO] [stdout] | [INFO] [stdout] 538 | let mut parent: Subtree = *(*((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:539:14 [INFO] [stdout] | [INFO] [stdout] 539 | ((*self_0).cursor.stack.size).wrapping_sub(2 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_language_alias_at` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:542:16 [INFO] [stdout] | [INFO] [stdout] 542 | return ts_language_alias_at( [INFO] [stdout] | ________________^ [INFO] [stdout] 543 | | (*self_0).language, [INFO] [stdout] 544 | | (*parent.ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] 545 | | entry.structural_child_index, [INFO] [stdout] 546 | | ) as libc::c_int [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:543:13 [INFO] [stdout] | [INFO] [stdout] 543 | (*self_0).language, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:544:13 [INFO] [stdout] | [INFO] [stdout] 544 | (*parent.ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:544:13 [INFO] [stdout] | [INFO] [stdout] 544 | (*parent.ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:544:15 [INFO] [stdout] | [INFO] [stdout] 544 | (*parent.ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:558:10 [INFO] [stdout] | [INFO] [stdout] 558 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / unsafe extern "C" fn iterator_get_visible_state( [INFO] [stdout] 552 | | mut self_0: *const Iterator_0, [INFO] [stdout] 553 | | mut tree: *mut Subtree, [INFO] [stdout] 554 | | mut alias_symbol: *mut TSSymbol, [INFO] [stdout] 555 | | mut start_byte: *mut uint32_t, [INFO] [stdout] 556 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:559:8 [INFO] [stdout] | [INFO] [stdout] 559 | if (*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:566:42 [INFO] [stdout] | [INFO] [stdout] 566 | let mut entry: TreeCursorEntry = *((*self_0).cursor.stack.contents).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:566:43 [INFO] [stdout] | [INFO] [stdout] 566 | let mut entry: TreeCursorEntry = *((*self_0).cursor.stack.contents).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:566:44 [INFO] [stdout] | [INFO] [stdout] 566 | let mut entry: TreeCursorEntry = *((*self_0).cursor.stack.contents).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:568:46 [INFO] [stdout] | [INFO] [stdout] 568 | let mut parent: *const Subtree = (*((*self_0).cursor.stack.contents) [INFO] [stdout] | ______________________________________________^ [INFO] [stdout] 569 | | .offset(i.wrapping_sub(1 as libc::c_int as libc::c_uint) as isize)) [INFO] [stdout] | |___________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:568:48 [INFO] [stdout] | [INFO] [stdout] 568 | let mut parent: *const Subtree = (*((*self_0).cursor.stack.contents) [INFO] [stdout] | ________________________________________________^ [INFO] [stdout] 569 | | .offset(i.wrapping_sub(1 as libc::c_int as libc::c_uint) as isize)) [INFO] [stdout] | |__________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:568:49 [INFO] [stdout] | [INFO] [stdout] 568 | let mut parent: *const Subtree = (*((*self_0).cursor.stack.contents) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:571:13 [INFO] [stdout] | [INFO] [stdout] 571 | *alias_symbol = ts_language_alias_at( [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_language_alias_at` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:571:29 [INFO] [stdout] | [INFO] [stdout] 571 | *alias_symbol = ts_language_alias_at( [INFO] [stdout] | _____________________________^ [INFO] [stdout] 572 | | (*self_0).language, [INFO] [stdout] 573 | | (*(*parent).ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] 574 | | entry.structural_child_index, [INFO] [stdout] 575 | | ); [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:572:17 [INFO] [stdout] | [INFO] [stdout] 572 | (*self_0).language, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:573:17 [INFO] [stdout] | [INFO] [stdout] 573 | (*(*parent).ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:573:17 [INFO] [stdout] | [INFO] [stdout] 573 | (*(*parent).ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:573:19 [INFO] [stdout] | [INFO] [stdout] 573 | (*(*parent).ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:573:19 [INFO] [stdout] | [INFO] [stdout] 573 | (*(*parent).ptr).c2rust_unnamed.c2rust_unnamed.production_id as uint32_t, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:577:12 [INFO] [stdout] | [INFO] [stdout] 577 | if ts_subtree_visible(*entry.subtree) as libc::c_int != 0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:577:31 [INFO] [stdout] | [INFO] [stdout] 577 | if ts_subtree_visible(*entry.subtree) as libc::c_int != 0 [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:578:16 [INFO] [stdout] | [INFO] [stdout] 578 | || *alias_symbol as libc::c_int != 0 [INFO] [stdout] | ^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:580:13 [INFO] [stdout] | [INFO] [stdout] 580 | *tree = *entry.subtree; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:580:21 [INFO] [stdout] | [INFO] [stdout] 580 | *tree = *entry.subtree; [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:581:13 [INFO] [stdout] | [INFO] [stdout] 581 | *start_byte = entry.position.bytes; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:589:8 [INFO] [stdout] | [INFO] [stdout] 589 | if iterator_done(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:588:1 [INFO] [stdout] | [INFO] [stdout] 588 | unsafe extern "C" fn iterator_ascend(mut self_0: *mut Iterator_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_tree_is_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:592:8 [INFO] [stdout] | [INFO] [stdout] 592 | if iterator_tree_is_visible(self_0) as libc::c_int != 0 && !(*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:592:65 [INFO] [stdout] | [INFO] [stdout] 592 | if iterator_tree_is_visible(self_0) as libc::c_int != 0 && !(*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:593:9 [INFO] [stdout] | [INFO] [stdout] 593 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:593:36 [INFO] [stdout] | [INFO] [stdout] 593 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:595:9 [INFO] [stdout] | [INFO] [stdout] 595 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:596:11 [INFO] [stdout] | [INFO] [stdout] 596 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:601:8 [INFO] [stdout] | [INFO] [stdout] 601 | if (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ________^ [INFO] [stdout] 602 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 603 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |_______________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:601:16 [INFO] [stdout] | [INFO] [stdout] 601 | if (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ________________^ [INFO] [stdout] 602 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 603 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |_____^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:601:17 [INFO] [stdout] | [INFO] [stdout] 601 | if (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | _________________^ [INFO] [stdout] 602 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 603 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:601:18 [INFO] [stdout] | [INFO] [stdout] 601 | if (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:602:10 [INFO] [stdout] | [INFO] [stdout] 602 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:607:9 [INFO] [stdout] | [INFO] [stdout] 607 | (*self_0).in_padding = 0 as libc::c_int != 0; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:609:5 [INFO] [stdout] | [INFO] [stdout] 609 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:609:36 [INFO] [stdout] | [INFO] [stdout] 609 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:615:8 [INFO] [stdout] | [INFO] [stdout] 615 | if (*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:611:1 [INFO] [stdout] | [INFO] [stdout] 611 | / unsafe extern "C" fn iterator_descend( [INFO] [stdout] 612 | | mut self_0: *mut Iterator_0, [INFO] [stdout] 613 | | mut goal_position: uint32_t, [INFO] [stdout] 614 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:621:13 [INFO] [stdout] | [INFO] [stdout] 621 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:622:15 [INFO] [stdout] | [INFO] [stdout] 622 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:627:42 [INFO] [stdout] | [INFO] [stdout] 627 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | __________________________________________^ [INFO] [stdout] 628 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 629 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |__________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:627:49 [INFO] [stdout] | [INFO] [stdout] 627 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | _________________________________________________^ [INFO] [stdout] 628 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 629 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:627:50 [INFO] [stdout] | [INFO] [stdout] 627 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | __________________________________________________^ [INFO] [stdout] 628 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 629 | | ) as *mut TreeCursorEntry); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:627:51 [INFO] [stdout] | [INFO] [stdout] 627 | let mut entry: TreeCursorEntry = *(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:628:14 [INFO] [stdout] | [INFO] [stdout] 628 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_child_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:633:31 [INFO] [stdout] | [INFO] [stdout] 633 | let mut n: uint32_t = ts_subtree_child_count(*entry.subtree); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:633:54 [INFO] [stdout] | [INFO] [stdout] 633 | let mut n: uint32_t = ts_subtree_child_count(*entry.subtree); [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:636:22 [INFO] [stdout] | [INFO] [stdout] 636 | &mut *if ((*entry.subtree).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ______________________^ [INFO] [stdout] 637 | | 0 as *mut Subtree [INFO] [stdout] 638 | | } else { [INFO] [stdout] 639 | | ((*entry.subtree).ptr as *mut Subtree) [INFO] [stdout] 640 | | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] 641 | | } [INFO] [stdout] 642 | | .offset(i as isize) as *mut Subtree; [INFO] [stdout] | |___________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:636:23 [INFO] [stdout] | [INFO] [stdout] 636 | &mut *if ((*entry.subtree).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | _______________________^ [INFO] [stdout] 637 | | 0 as *mut Subtree [INFO] [stdout] 638 | | } else { [INFO] [stdout] 639 | | ((*entry.subtree).ptr as *mut Subtree) [INFO] [stdout] 640 | | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] 641 | | } [INFO] [stdout] 642 | | .offset(i as isize) as *mut Subtree; [INFO] [stdout] | |___________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:636:26 [INFO] [stdout] | [INFO] [stdout] 636 | &mut *if ((*entry.subtree).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:636:27 [INFO] [stdout] | [INFO] [stdout] 636 | &mut *if ((*entry.subtree).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:639:21 [INFO] [stdout] | [INFO] [stdout] 639 | / ((*entry.subtree).ptr as *mut Subtree) [INFO] [stdout] 640 | | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] | |________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:639:22 [INFO] [stdout] | [INFO] [stdout] 639 | ((*entry.subtree).ptr as *mut Subtree) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:639:22 [INFO] [stdout] | [INFO] [stdout] 639 | ((*entry.subtree).ptr as *mut Subtree) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:640:35 [INFO] [stdout] | [INFO] [stdout] 640 | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:640:37 [INFO] [stdout] | [INFO] [stdout] 640 | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:640:37 [INFO] [stdout] | [INFO] [stdout] 640 | .offset(-((*(*entry.subtree).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:643:42 [INFO] [stdout] | [INFO] [stdout] 643 | let mut child_left: Length = length_add(position, ts_subtree_padding(*child)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_padding` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:643:63 [INFO] [stdout] | [INFO] [stdout] 643 | let mut child_left: Length = length_add(position, ts_subtree_padding(*child)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:643:82 [INFO] [stdout] | [INFO] [stdout] 643 | let mut child_left: Length = length_add(position, ts_subtree_padding(*child)); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:644:43 [INFO] [stdout] | [INFO] [stdout] 644 | let mut child_right: Length = length_add(child_left, ts_subtree_size(*child)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:644:66 [INFO] [stdout] | [INFO] [stdout] 644 | let mut child_right: Length = length_add(child_left, ts_subtree_size(*child)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:644:82 [INFO] [stdout] | [INFO] [stdout] 644 | let mut child_right: Length = length_add(child_left, ts_subtree_size(*child)); [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::_array__grow` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:646:17 [INFO] [stdout] | [INFO] [stdout] 646 | / _array__grow( [INFO] [stdout] 647 | | &mut (*self_0).cursor.stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] 648 | | 1 as libc::c_int as uint32_t, [INFO] [stdout] 649 | | ::core::mem::size_of::() as libc::c_ulong, [INFO] [stdout] 650 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:647:26 [INFO] [stdout] | [INFO] [stdout] 647 | &mut (*self_0).cursor.stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:651:30 [INFO] [stdout] | [INFO] [stdout] 651 | let fresh2 = (*self_0).cursor.stack.size; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:652:17 [INFO] [stdout] | [INFO] [stdout] 652 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:652:48 [INFO] [stdout] | [INFO] [stdout] 652 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:653:17 [INFO] [stdout] | [INFO] [stdout] 653 | *((*self_0).cursor.stack.contents).offset(fresh2 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:653:18 [INFO] [stdout] | [INFO] [stdout] 653 | *((*self_0).cursor.stack.contents).offset(fresh2 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:653:19 [INFO] [stdout] | [INFO] [stdout] 653 | *((*self_0).cursor.stack.contents).offset(fresh2 as isize) = { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_tree_is_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:663:20 [INFO] [stdout] | [INFO] [stdout] 663 | if iterator_tree_is_visible(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:665:25 [INFO] [stdout] | [INFO] [stdout] 665 | (*self_0).in_padding = 1 as libc::c_int != 0; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:667:25 [INFO] [stdout] | [INFO] [stdout] 667 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:667:52 [INFO] [stdout] | [INFO] [stdout] 667 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_extra` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:675:21 [INFO] [stdout] | [INFO] [stdout] 675 | if !ts_subtree_extra(*child) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:675:38 [INFO] [stdout] | [INFO] [stdout] 675 | if !ts_subtree_extra(*child) { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:688:8 [INFO] [stdout] | [INFO] [stdout] 688 | if (*self_0).in_padding { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:687:1 [INFO] [stdout] | [INFO] [stdout] 687 | unsafe extern "C" fn iterator_advance(mut self_0: *mut Iterator_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:689:9 [INFO] [stdout] | [INFO] [stdout] 689 | (*self_0).in_padding = 0 as libc::c_int != 0; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_tree_is_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:690:12 [INFO] [stdout] | [INFO] [stdout] 690 | if iterator_tree_is_visible(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:691:13 [INFO] [stdout] | [INFO] [stdout] 691 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:691:40 [INFO] [stdout] | [INFO] [stdout] 691 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_descend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:693:13 [INFO] [stdout] | [INFO] [stdout] 693 | iterator_descend(self_0, 0 as libc::c_int as uint32_t); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_tree_is_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:698:12 [INFO] [stdout] | [INFO] [stdout] 698 | if iterator_tree_is_visible(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:699:13 [INFO] [stdout] | [INFO] [stdout] 699 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:699:40 [INFO] [stdout] | [INFO] [stdout] 699 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:701:9 [INFO] [stdout] | [INFO] [stdout] 701 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:701:40 [INFO] [stdout] | [INFO] [stdout] 701 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:703:13 [INFO] [stdout] | [INFO] [stdout] 703 | *((*self_0).cursor.stack.contents).offset((*self_0).cursor.stack.size as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:703:14 [INFO] [stdout] | [INFO] [stdout] 703 | *((*self_0).cursor.stack.contents).offset((*self_0).cursor.stack.size as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:703:15 [INFO] [stdout] | [INFO] [stdout] 703 | *((*self_0).cursor.stack.contents).offset((*self_0).cursor.stack.size as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:703:55 [INFO] [stdout] | [INFO] [stdout] 703 | *((*self_0).cursor.stack.contents).offset((*self_0).cursor.stack.size as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:704:12 [INFO] [stdout] | [INFO] [stdout] 704 | if iterator_done(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:707:13 [INFO] [stdout] | [INFO] [stdout] 707 | if ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:708:15 [INFO] [stdout] | [INFO] [stdout] 708 | < (*self_0).cursor.stack.size [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:713:42 [INFO] [stdout] | [INFO] [stdout] 713 | let mut parent: *const Subtree = (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | __________________________________________^ [INFO] [stdout] 714 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 715 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |___________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:713:50 [INFO] [stdout] | [INFO] [stdout] 713 | let mut parent: *const Subtree = (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | __________________________________________________^ [INFO] [stdout] 714 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 715 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |_________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:713:51 [INFO] [stdout] | [INFO] [stdout] 713 | let mut parent: *const Subtree = (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ___________________________________________________^ [INFO] [stdout] 714 | | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] 715 | | ) as *mut TreeCursorEntry)) [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:713:52 [INFO] [stdout] | [INFO] [stdout] 713 | let mut parent: *const Subtree = (*(&mut *((*self_0).cursor.stack.contents).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:714:14 [INFO] [stdout] | [INFO] [stdout] 714 | ((*self_0).cursor.stack.size).wrapping_sub(1 as libc::c_int as libc::c_uint) as isize, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_child_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:719:14 [INFO] [stdout] | [INFO] [stdout] 719 | if !(ts_subtree_child_count(*parent) > child_index) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:719:37 [INFO] [stdout] | [INFO] [stdout] 719 | if !(ts_subtree_child_count(*parent) > child_index) { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:723:13 [INFO] [stdout] | [INFO] [stdout] 723 | length_add(entry.position, ts_subtree_total_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_total_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:723:40 [INFO] [stdout] | [INFO] [stdout] 723 | length_add(entry.position, ts_subtree_total_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:723:62 [INFO] [stdout] | [INFO] [stdout] 723 | length_add(entry.position, ts_subtree_total_size(*entry.subtree)); [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_extra` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:725:13 [INFO] [stdout] | [INFO] [stdout] 725 | if !ts_subtree_extra(*entry.subtree) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:725:30 [INFO] [stdout] | [INFO] [stdout] 725 | if !ts_subtree_extra(*entry.subtree) { [INFO] [stdout] | ^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:729:18 [INFO] [stdout] | [INFO] [stdout] 729 | &mut *if ((*parent).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | __________________^ [INFO] [stdout] 730 | | 0 as *mut Subtree [INFO] [stdout] 731 | | } else { [INFO] [stdout] 732 | | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] 733 | | } [INFO] [stdout] 734 | | .offset(child_index as isize) as *mut Subtree; [INFO] [stdout] | |_________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:729:19 [INFO] [stdout] | [INFO] [stdout] 729 | &mut *if ((*parent).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ___________________^ [INFO] [stdout] 730 | | 0 as *mut Subtree [INFO] [stdout] 731 | | } else { [INFO] [stdout] 732 | | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] 733 | | } [INFO] [stdout] 734 | | .offset(child_index as isize) as *mut Subtree; [INFO] [stdout] | |_________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:729:22 [INFO] [stdout] | [INFO] [stdout] 729 | &mut *if ((*parent).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:729:23 [INFO] [stdout] | [INFO] [stdout] 729 | &mut *if ((*parent).data).is_inline() as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:17 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:18 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:18 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:58 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:60 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:732:60 [INFO] [stdout] | [INFO] [stdout] 732 | ((*parent).ptr as *mut Subtree).offset(-((*(*parent).ptr).child_count as isize)) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::_array__grow` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:735:9 [INFO] [stdout] | [INFO] [stdout] 735 | / _array__grow( [INFO] [stdout] 736 | | &mut (*self_0).cursor.stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] 737 | | 1 as libc::c_int as uint32_t, [INFO] [stdout] 738 | | ::core::mem::size_of::() as libc::c_ulong, [INFO] [stdout] 739 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:736:18 [INFO] [stdout] | [INFO] [stdout] 736 | &mut (*self_0).cursor.stack as *mut C2RustUnnamed_7 as *mut Array, [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:740:22 [INFO] [stdout] | [INFO] [stdout] 740 | let fresh3 = (*self_0).cursor.stack.size; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:741:9 [INFO] [stdout] | [INFO] [stdout] 741 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:741:40 [INFO] [stdout] | [INFO] [stdout] 741 | (*self_0).cursor.stack.size = ((*self_0).cursor.stack.size).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:742:9 [INFO] [stdout] | [INFO] [stdout] 742 | *((*self_0).cursor.stack.contents).offset(fresh3 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:742:10 [INFO] [stdout] | [INFO] [stdout] 742 | *((*self_0).cursor.stack.contents).offset(fresh3 as isize) = { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:742:11 [INFO] [stdout] | [INFO] [stdout] 742 | *((*self_0).cursor.stack.contents).offset(fresh3 as isize) = { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_tree_is_visible` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:752:12 [INFO] [stdout] | [INFO] [stdout] 752 | if iterator_tree_is_visible(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_padding` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:753:16 [INFO] [stdout] | [INFO] [stdout] 753 | if (ts_subtree_padding(*next_child)).bytes > 0 as libc::c_int as libc::c_uint { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:753:36 [INFO] [stdout] | [INFO] [stdout] 753 | if (ts_subtree_padding(*next_child)).bytes > 0 as libc::c_int as libc::c_uint { [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:754:17 [INFO] [stdout] | [INFO] [stdout] 754 | (*self_0).in_padding = 1 as libc::c_int != 0; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:756:17 [INFO] [stdout] | [INFO] [stdout] 756 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:756:44 [INFO] [stdout] | [INFO] [stdout] 756 | (*self_0).visible_depth = ((*self_0).visible_depth).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_descend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:759:13 [INFO] [stdout] | [INFO] [stdout] 759 | iterator_descend(self_0, 0 as libc::c_int as uint32_t); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_get_visible_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:778:5 [INFO] [stdout] | [INFO] [stdout] 778 | / iterator_get_visible_state( [INFO] [stdout] 779 | | old_iter, [INFO] [stdout] 780 | | &mut old_tree, [INFO] [stdout] 781 | | &mut old_alias_symbol, [INFO] [stdout] 782 | | &mut old_start, [INFO] [stdout] 783 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:764:1 [INFO] [stdout] | [INFO] [stdout] 764 | / unsafe extern "C" fn iterator_compare( [INFO] [stdout] 765 | | mut old_iter: *const Iterator_0, [INFO] [stdout] 766 | | mut new_iter: *const Iterator_0, [INFO] [stdout] 767 | | ) -> IteratorComparison { [INFO] [stdout] | |_______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_get_visible_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:784:5 [INFO] [stdout] | [INFO] [stdout] 784 | / iterator_get_visible_state( [INFO] [stdout] 785 | | new_iter, [INFO] [stdout] 786 | | &mut new_tree, [INFO] [stdout] 787 | | &mut new_alias_symbol, [INFO] [stdout] 788 | | &mut new_start, [INFO] [stdout] 789 | | ); [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:790:8 [INFO] [stdout] | [INFO] [stdout] 790 | if (old_tree.ptr).is_null() && (new_tree.ptr).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:790:36 [INFO] [stdout] | [INFO] [stdout] 790 | if (old_tree.ptr).is_null() && (new_tree.ptr).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:793:8 [INFO] [stdout] | [INFO] [stdout] 793 | if (old_tree.ptr).is_null() || (new_tree.ptr).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:793:36 [INFO] [stdout] | [INFO] [stdout] 793 | if (old_tree.ptr).is_null() || (new_tree.ptr).is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:797:12 [INFO] [stdout] | [INFO] [stdout] 797 | && ts_subtree_symbol(old_tree) as libc::c_int == ts_subtree_symbol(new_tree) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:797:58 [INFO] [stdout] | [INFO] [stdout] 797 | && ts_subtree_symbol(old_tree) as libc::c_int == ts_subtree_symbol(new_tree) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_has_changes` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:800:17 [INFO] [stdout] | [INFO] [stdout] 800 | && !ts_subtree_has_changes(old_tree) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_symbol` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:801:16 [INFO] [stdout] | [INFO] [stdout] 801 | && ts_subtree_symbol(old_tree) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:803:16 [INFO] [stdout] | [INFO] [stdout] 803 | && (ts_subtree_size(old_tree)).bytes == (ts_subtree_size(new_tree)).bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:803:53 [INFO] [stdout] | [INFO] [stdout] 803 | && (ts_subtree_size(old_tree)).bytes == (ts_subtree_size(new_tree)).bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_parse_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:804:16 [INFO] [stdout] | [INFO] [stdout] 804 | && ts_subtree_parse_state(old_tree) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_parse_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:806:16 [INFO] [stdout] | [INFO] [stdout] 806 | && ts_subtree_parse_state(new_tree) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_parse_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:808:17 [INFO] [stdout] | [INFO] [stdout] 808 | && (ts_subtree_parse_state(old_tree) as libc::c_int == 0 as libc::c_int) as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_parse_state` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:809:21 [INFO] [stdout] | [INFO] [stdout] 809 | == (ts_subtree_parse_state(new_tree) as libc::c_int == 0 as libc::c_int) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_new` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:837:36 [INFO] [stdout] | [INFO] [stdout] 837 | let mut old_iter: Iterator_0 = iterator_new(cursor1, old_tree, language); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:820:1 [INFO] [stdout] | [INFO] [stdout] 820 | / pub unsafe extern "C" fn ts_subtree_get_changed_ranges( [INFO] [stdout] 821 | | mut old_tree: *const Subtree, [INFO] [stdout] 822 | | mut new_tree: *const Subtree, [INFO] [stdout] 823 | | mut cursor1: *mut TreeCursor, [INFO] [stdout] ... | [INFO] [stdout] 827 | | mut ranges: *mut *mut TSRange, [INFO] [stdout] 828 | | ) -> libc::c_uint { [INFO] [stdout] | |_________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_new` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:838:36 [INFO] [stdout] | [INFO] [stdout] 838 | let mut new_iter: Iterator_0 = iterator_new(cursor2, new_tree, language); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_start_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:840:32 [INFO] [stdout] | [INFO] [stdout] 840 | let mut position: Length = iterator_start_position(&mut old_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_start_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:841:37 [INFO] [stdout] | [INFO] [stdout] 841 | let mut next_position: Length = iterator_start_position(&mut new_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:843:9 [INFO] [stdout] | [INFO] [stdout] 843 | ts_range_array_add(&mut results, position, next_position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:846:9 [INFO] [stdout] | [INFO] [stdout] 846 | ts_range_array_add(&mut results, next_position, position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_compare` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:850:50 [INFO] [stdout] | [INFO] [stdout] 850 | let mut comparison: IteratorComparison = iterator_compare(&mut old_iter, &mut new_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_intersects` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:852:16 [INFO] [stdout] | [INFO] [stdout] 852 | && ts_range_array_intersects( [INFO] [stdout] | ________________^ [INFO] [stdout] 853 | | included_range_differences, [INFO] [stdout] 854 | | included_range_difference_index, [INFO] [stdout] 855 | | position.bytes, [INFO] [stdout] 856 | | (iterator_end_position(&mut old_iter)).bytes, [INFO] [stdout] 857 | | ) as libc::c_int [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:856:17 [INFO] [stdout] | [INFO] [stdout] 856 | (iterator_end_position(&mut old_iter)).bytes, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:865:33 [INFO] [stdout] | [INFO] [stdout] 865 | next_position = iterator_end_position(&mut old_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_descend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:868:20 [INFO] [stdout] | [INFO] [stdout] 868 | if iterator_descend(&mut old_iter, position.bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_descend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:869:25 [INFO] [stdout] | [INFO] [stdout] 869 | if !iterator_descend(&mut new_iter, position.bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:871:41 [INFO] [stdout] | [INFO] [stdout] 871 | next_position = iterator_end_position(&mut old_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_descend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:873:27 [INFO] [stdout] | [INFO] [stdout] 873 | } else if iterator_descend(&mut new_iter, position.bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:875:37 [INFO] [stdout] | [INFO] [stdout] 875 | next_position = iterator_end_position(&mut new_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_min` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:877:37 [INFO] [stdout] | [INFO] [stdout] 877 | next_position = length_min( [INFO] [stdout] | _____________________________________^ [INFO] [stdout] 878 | | iterator_end_position(&mut old_iter), [INFO] [stdout] 879 | | iterator_end_position(&mut new_iter), [INFO] [stdout] 880 | | ); [INFO] [stdout] | |_____________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:878:25 [INFO] [stdout] | [INFO] [stdout] 878 | iterator_end_position(&mut old_iter), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:879:25 [INFO] [stdout] | [INFO] [stdout] 879 | iterator_end_position(&mut new_iter), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::length_min` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:885:33 [INFO] [stdout] | [INFO] [stdout] 885 | next_position = length_min( [INFO] [stdout] | _________________________________^ [INFO] [stdout] 886 | | iterator_end_position(&mut old_iter), [INFO] [stdout] 887 | | iterator_end_position(&mut new_iter), [INFO] [stdout] 888 | | ); [INFO] [stdout] | |_________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:886:21 [INFO] [stdout] | [INFO] [stdout] 886 | iterator_end_position(&mut old_iter), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:887:21 [INFO] [stdout] | [INFO] [stdout] 887 | iterator_end_position(&mut new_iter), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:892:16 [INFO] [stdout] | [INFO] [stdout] 892 | while !iterator_done(&mut old_iter) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:893:16 [INFO] [stdout] | [INFO] [stdout] 893 | && (iterator_end_position(&mut old_iter)).bytes <= next_position.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_advance` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:895:13 [INFO] [stdout] | [INFO] [stdout] 895 | iterator_advance(&mut old_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:897:16 [INFO] [stdout] | [INFO] [stdout] 897 | while !iterator_done(&mut new_iter) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_end_position` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:898:16 [INFO] [stdout] | [INFO] [stdout] 898 | && (iterator_end_position(&mut new_iter)).bytes <= next_position.bytes [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_advance` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:900:13 [INFO] [stdout] | [INFO] [stdout] 900 | iterator_advance(&mut new_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_ascend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:903:13 [INFO] [stdout] | [INFO] [stdout] 903 | iterator_ascend(&mut old_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_ascend` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:906:13 [INFO] [stdout] | [INFO] [stdout] 906 | iterator_ascend(&mut new_iter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:909:13 [INFO] [stdout] | [INFO] [stdout] 909 | ts_range_array_add(&mut results, position, next_position); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:912:49 [INFO] [stdout] | [INFO] [stdout] 912 | while included_range_difference_index < (*included_range_differences).size { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:913:50 [INFO] [stdout] | [INFO] [stdout] 913 | let mut range: *const TSRange = &mut *((*included_range_differences).contents) [INFO] [stdout] | __________________________________________________^ [INFO] [stdout] 914 | | .offset(included_range_difference_index as isize) [INFO] [stdout] | |_________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:913:51 [INFO] [stdout] | [INFO] [stdout] 913 | let mut range: *const TSRange = &mut *((*included_range_differences).contents) [INFO] [stdout] | ___________________________________________________^ [INFO] [stdout] 914 | | .offset(included_range_difference_index as isize) [INFO] [stdout] | |_________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:913:52 [INFO] [stdout] | [INFO] [stdout] 913 | let mut range: *const TSRange = &mut *((*included_range_differences).contents) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:916:18 [INFO] [stdout] | [INFO] [stdout] 916 | if !((*range).end_byte <= position.bytes) { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:921:15 [INFO] [stdout] | [INFO] [stdout] 921 | if !(!iterator_done(&mut old_iter) && !iterator_done(&mut new_iter)) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::iterator_done` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:921:48 [INFO] [stdout] | [INFO] [stdout] 921 | if !(!iterator_done(&mut old_iter) && !iterator_done(&mut new_iter)) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_total_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:925:32 [INFO] [stdout] | [INFO] [stdout] 925 | let mut old_size: Length = ts_subtree_total_size(*old_tree); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:925:54 [INFO] [stdout] | [INFO] [stdout] 925 | let mut old_size: Length = ts_subtree_total_size(*old_tree); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_subtree_total_size` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:926:32 [INFO] [stdout] | [INFO] [stdout] 926 | let mut new_size: Length = ts_subtree_total_size(*new_tree); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:926:54 [INFO] [stdout] | [INFO] [stdout] 926 | let mut new_size: Length = ts_subtree_total_size(*new_tree); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:928:9 [INFO] [stdout] | [INFO] [stdout] 928 | ts_range_array_add(&mut results, old_size, new_size); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::get_changed_ranges::ts_range_array_add` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:930:9 [INFO] [stdout] | [INFO] [stdout] 930 | ts_range_array_add(&mut results, new_size, old_size); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:932:5 [INFO] [stdout] | [INFO] [stdout] 932 | *cursor1 = old_iter.cursor; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:933:5 [INFO] [stdout] | [INFO] [stdout] 933 | *cursor2 = new_iter.cursor; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/get_changed_ranges.rs:934:5 [INFO] [stdout] | [INFO] [stdout] 934 | *ranges = results.contents; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:119:33 [INFO] [stdout] | [INFO] [stdout] 119 | if state as libc::c_uint >= (*self_0).large_state_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:114:1 [INFO] [stdout] | [INFO] [stdout] 114 | / unsafe extern "C" fn ts_language_lookup( [INFO] [stdout] 115 | | mut self_0: *const TSLanguage, [INFO] [stdout] 116 | | mut state: TSStateId, [INFO] [stdout] 117 | | mut symbol: TSSymbol, [INFO] [stdout] 118 | | ) -> uint16_t { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:120:35 [INFO] [stdout] | [INFO] [stdout] 120 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ___________________________________^ [INFO] [stdout] 121 | | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | |_______________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:120:36 [INFO] [stdout] | [INFO] [stdout] 120 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ____________________________________^ [INFO] [stdout] 121 | | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | |_______________________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:120:37 [INFO] [stdout] | [INFO] [stdout] 120 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:121:58 [INFO] [stdout] | [INFO] [stdout] 121 | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:123:14 [INFO] [stdout] | [INFO] [stdout] 123 | &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:123:15 [INFO] [stdout] | [INFO] [stdout] 123 | &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:123:16 [INFO] [stdout] | [INFO] [stdout] 123 | &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:125:16 [INFO] [stdout] | [INFO] [stdout] 125 | data = data.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:126:41 [INFO] [stdout] | [INFO] [stdout] 126 | let mut group_count: uint16_t = *fresh0; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:130:20 [INFO] [stdout] | [INFO] [stdout] 130 | data = data.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:131:47 [INFO] [stdout] | [INFO] [stdout] 131 | let mut section_value: uint16_t = *fresh1; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:133:20 [INFO] [stdout] | [INFO] [stdout] 133 | data = data.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:134:46 [INFO] [stdout] | [INFO] [stdout] 134 | let mut symbol_count: uint16_t = *fresh2; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:138:24 [INFO] [stdout] | [INFO] [stdout] 138 | data = data.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:139:20 [INFO] [stdout] | [INFO] [stdout] 139 | if *fresh3 as libc::c_int == symbol as libc::c_int { [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:148:16 [INFO] [stdout] | [INFO] [stdout] 148 | return *((*self_0).parse_table).offset( [INFO] [stdout] | ________________^ [INFO] [stdout] 149 | | (state as libc::c_uint) [INFO] [stdout] 150 | | .wrapping_mul((*self_0).symbol_count) [INFO] [stdout] 151 | | .wrapping_add(symbol as libc::c_uint) as isize, [INFO] [stdout] 152 | | ); [INFO] [stdout] | |_________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:148:17 [INFO] [stdout] | [INFO] [stdout] 148 | return *((*self_0).parse_table).offset( [INFO] [stdout] | _________________^ [INFO] [stdout] 149 | | (state as libc::c_uint) [INFO] [stdout] 150 | | .wrapping_mul((*self_0).symbol_count) [INFO] [stdout] 151 | | .wrapping_add(symbol as libc::c_uint) as isize, [INFO] [stdout] 152 | | ); [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:148:18 [INFO] [stdout] | [INFO] [stdout] 148 | return *((*self_0).parse_table).offset( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:150:31 [INFO] [stdout] | [INFO] [stdout] 150 | .wrapping_mul((*self_0).symbol_count) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_table_entry` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:167:5 [INFO] [stdout] | [INFO] [stdout] 167 | ts_language_table_entry(self_0, state, symbol, &mut entry); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:156:1 [INFO] [stdout] | [INFO] [stdout] 156 | / unsafe extern "C" fn ts_language_actions( [INFO] [stdout] 157 | | mut self_0: *const TSLanguage, [INFO] [stdout] 158 | | mut state: TSStateId, [INFO] [stdout] 159 | | mut symbol: TSSymbol, [INFO] [stdout] 160 | | mut count: *mut uint32_t, [INFO] [stdout] 161 | | ) -> *const TSParseAction { [INFO] [stdout] | |_________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | *count = entry.action_count; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:176:61 [INFO] [stdout] | [INFO] [stdout] 176 | let mut is_small_state: bool = state as libc::c_uint >= (*self_0).large_state_count; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:172:1 [INFO] [stdout] | [INFO] [stdout] 172 | / unsafe extern "C" fn ts_language_lookaheads( [INFO] [stdout] 173 | | mut self_0: *const TSLanguage, [INFO] [stdout] 174 | | mut state: TSStateId, [INFO] [stdout] 175 | | ) -> LookaheadIterator { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:181:35 [INFO] [stdout] | [INFO] [stdout] 181 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ___________________________________^ [INFO] [stdout] 182 | | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | |_______________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:181:36 [INFO] [stdout] | [INFO] [stdout] 181 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ____________________________________^ [INFO] [stdout] 182 | | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | |_______________________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:181:37 [INFO] [stdout] | [INFO] [stdout] 181 | let mut index: uint32_t = *((*self_0).small_parse_table_map) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:182:58 [INFO] [stdout] | [INFO] [stdout] 182 | .offset((state as libc::c_uint).wrapping_sub((*self_0).large_state_count) as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:183:17 [INFO] [stdout] | [INFO] [stdout] 183 | data = &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:183:18 [INFO] [stdout] | [INFO] [stdout] 183 | data = &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:183:19 [INFO] [stdout] | [INFO] [stdout] 183 | data = &*((*self_0).small_parse_table).offset(index as isize) as *const uint16_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:184:21 [INFO] [stdout] | [INFO] [stdout] 184 | group_end = data.offset(1 as libc::c_int as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:185:23 [INFO] [stdout] | [INFO] [stdout] 185 | group_count = *data; [INFO] [stdout] | ^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:187:16 [INFO] [stdout] | [INFO] [stdout] 187 | data = (&*((*self_0).parse_table) [INFO] [stdout] | ________________^ [INFO] [stdout] 188 | | .offset((state as libc::c_uint).wrapping_mul((*self_0).symbol_count) as isize) [INFO] [stdout] 189 | | as *const uint16_t) [INFO] [stdout] 190 | | .offset(-(1 as libc::c_int as isize)); [INFO] [stdout] | |_________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:187:18 [INFO] [stdout] | [INFO] [stdout] 187 | data = (&*((*self_0).parse_table) [INFO] [stdout] | __________________^ [INFO] [stdout] 188 | | .offset((state as libc::c_uint).wrapping_mul((*self_0).symbol_count) as isize) [INFO] [stdout] | |__________________________________________________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:187:19 [INFO] [stdout] | [INFO] [stdout] 187 | data = (&*((*self_0).parse_table) [INFO] [stdout] | ___________________^ [INFO] [stdout] 188 | | .offset((state as libc::c_uint).wrapping_mul((*self_0).symbol_count) as isize) [INFO] [stdout] | |__________________________________________________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:187:20 [INFO] [stdout] | [INFO] [stdout] 187 | data = (&*((*self_0).parse_table) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:188:58 [INFO] [stdout] | [INFO] [stdout] 188 | .offset((state as libc::c_uint).wrapping_mul((*self_0).symbol_count) as isize) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:212:8 [INFO] [stdout] | [INFO] [stdout] 212 | if (*self_0).is_small_state { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:211:1 [INFO] [stdout] | [INFO] [stdout] 211 | unsafe extern "C" fn ts_lookahead_iterator__next(mut self_0: *mut LookaheadIterator) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:213:9 [INFO] [stdout] | [INFO] [stdout] 213 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:213:26 [INFO] [stdout] | [INFO] [stdout] 213 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:213:27 [INFO] [stdout] | [INFO] [stdout] 213 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:214:12 [INFO] [stdout] | [INFO] [stdout] 214 | if (*self_0).data == (*self_0).group_end { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:214:30 [INFO] [stdout] | [INFO] [stdout] 214 | if (*self_0).data == (*self_0).group_end { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:215:16 [INFO] [stdout] | [INFO] [stdout] 215 | if (*self_0).group_count as libc::c_int == 0 as libc::c_int { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:218:13 [INFO] [stdout] | [INFO] [stdout] 218 | (*self_0).group_count = ((*self_0).group_count).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:218:38 [INFO] [stdout] | [INFO] [stdout] 218 | (*self_0).group_count = ((*self_0).group_count).wrapping_sub(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:219:26 [INFO] [stdout] | [INFO] [stdout] 219 | let fresh4 = (*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:220:13 [INFO] [stdout] | [INFO] [stdout] 220 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:220:30 [INFO] [stdout] | [INFO] [stdout] 220 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:220:31 [INFO] [stdout] | [INFO] [stdout] 220 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:221:13 [INFO] [stdout] | [INFO] [stdout] 221 | (*self_0).table_value = *fresh4; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:221:37 [INFO] [stdout] | [INFO] [stdout] 221 | (*self_0).table_value = *fresh4; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:222:26 [INFO] [stdout] | [INFO] [stdout] 222 | let fresh5 = (*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:223:13 [INFO] [stdout] | [INFO] [stdout] 223 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:223:30 [INFO] [stdout] | [INFO] [stdout] 223 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:223:31 [INFO] [stdout] | [INFO] [stdout] 223 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:224:50 [INFO] [stdout] | [INFO] [stdout] 224 | let mut symbol_count: libc::c_uint = *fresh5 as libc::c_uint; [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:225:13 [INFO] [stdout] | [INFO] [stdout] 225 | (*self_0).group_end = ((*self_0).data).offset(symbol_count as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:225:35 [INFO] [stdout] | [INFO] [stdout] 225 | (*self_0).group_end = ((*self_0).data).offset(symbol_count as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:225:36 [INFO] [stdout] | [INFO] [stdout] 225 | (*self_0).group_end = ((*self_0).data).offset(symbol_count as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:226:13 [INFO] [stdout] | [INFO] [stdout] 226 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:226:32 [INFO] [stdout] | [INFO] [stdout] 226 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:226:33 [INFO] [stdout] | [INFO] [stdout] 226 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:228:13 [INFO] [stdout] | [INFO] [stdout] 228 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:228:32 [INFO] [stdout] | [INFO] [stdout] 228 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:228:33 [INFO] [stdout] | [INFO] [stdout] 228 | (*self_0).symbol = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:233:13 [INFO] [stdout] | [INFO] [stdout] 233 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:233:30 [INFO] [stdout] | [INFO] [stdout] 233 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:233:31 [INFO] [stdout] | [INFO] [stdout] 233 | (*self_0).data = ((*self_0).data).offset(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:234:13 [INFO] [stdout] | [INFO] [stdout] 234 | (*self_0).symbol = ((*self_0).symbol).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:234:33 [INFO] [stdout] | [INFO] [stdout] 234 | (*self_0).symbol = ((*self_0).symbol).wrapping_add(1); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:235:16 [INFO] [stdout] | [INFO] [stdout] 235 | if (*self_0).symbol as libc::c_uint >= (*(*self_0).language).symbol_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:235:52 [INFO] [stdout] | [INFO] [stdout] 235 | if (*self_0).symbol as libc::c_uint >= (*(*self_0).language).symbol_count { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:235:54 [INFO] [stdout] | [INFO] [stdout] 235 | if (*self_0).symbol as libc::c_uint >= (*(*self_0).language).symbol_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:238:13 [INFO] [stdout] | [INFO] [stdout] 238 | (*self_0).table_value = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:238:37 [INFO] [stdout] | [INFO] [stdout] 238 | (*self_0).table_value = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:238:38 [INFO] [stdout] | [INFO] [stdout] 238 | (*self_0).table_value = *(*self_0).data; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:239:18 [INFO] [stdout] | [INFO] [stdout] 239 | if !((*self_0).table_value == 0) { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:244:9 [INFO] [stdout] | [INFO] [stdout] 244 | if ((*self_0).symbol as libc::c_uint) < (*(*self_0).language).token_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:244:45 [INFO] [stdout] | [INFO] [stdout] 244 | if ((*self_0).symbol as libc::c_uint) < (*(*self_0).language).token_count { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:244:47 [INFO] [stdout] | [INFO] [stdout] 244 | if ((*self_0).symbol as libc::c_uint) < (*(*self_0).language).token_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:245:53 [INFO] [stdout] | [INFO] [stdout] 245 | let mut entry: *const TSParseActionEntry = &*((*(*self_0).language).parse_actions) [INFO] [stdout] | _____________________________________________________^ [INFO] [stdout] 246 | | .offset((*self_0).table_value as isize) [INFO] [stdout] | |___________________________________________________^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:245:54 [INFO] [stdout] | [INFO] [stdout] 245 | let mut entry: *const TSParseActionEntry = &*((*(*self_0).language).parse_actions) [INFO] [stdout] | ______________________________________________________^ [INFO] [stdout] 246 | | .offset((*self_0).table_value as isize) [INFO] [stdout] | |___________________________________________________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:245:55 [INFO] [stdout] | [INFO] [stdout] 245 | let mut entry: *const TSParseActionEntry = &*((*(*self_0).language).parse_actions) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:245:57 [INFO] [stdout] | [INFO] [stdout] 245 | let mut entry: *const TSParseActionEntry = &*((*(*self_0).language).parse_actions) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:246:21 [INFO] [stdout] | [INFO] [stdout] 246 | .offset((*self_0).table_value as isize) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:248:9 [INFO] [stdout] | [INFO] [stdout] 248 | (*self_0).action_count = (*entry).entry.count as uint16_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:248:34 [INFO] [stdout] | [INFO] [stdout] 248 | (*self_0).action_count = (*entry).entry.count as uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:248:34 [INFO] [stdout] | [INFO] [stdout] 248 | (*self_0).action_count = (*entry).entry.count as uint16_t; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:249:9 [INFO] [stdout] | [INFO] [stdout] 249 | (*self_0).actions = entry.offset(1 as libc::c_int as isize) as *const TSParseAction; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:249:29 [INFO] [stdout] | [INFO] [stdout] 249 | (*self_0).actions = entry.offset(1 as libc::c_int as isize) as *const TSParseAction; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:250:9 [INFO] [stdout] | [INFO] [stdout] 250 | (*self_0).next_state = 0 as libc::c_int as TSStateId; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:252:9 [INFO] [stdout] | [INFO] [stdout] 252 | (*self_0).action_count = 0 as libc::c_int as uint16_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:253:9 [INFO] [stdout] | [INFO] [stdout] 253 | (*self_0).next_state = (*self_0).table_value; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:253:32 [INFO] [stdout] | [INFO] [stdout] 253 | (*self_0).next_state = (*self_0).table_value; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::wasm_store::ts_language_is_wasm` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:259:29 [INFO] [stdout] | [INFO] [stdout] 259 | if !self_0.is_null() && ts_language_is_wasm(self_0) as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:258:1 [INFO] [stdout] | [INFO] [stdout] 258 | pub unsafe extern "C" fn ts_language_copy(mut self_0: *const TSLanguage) -> *const TSLanguage { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::wasm_store::ts_wasm_language_retain` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:260:9 [INFO] [stdout] | [INFO] [stdout] 260 | ts_wasm_language_retain(self_0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::wasm_store::ts_language_is_wasm` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:266:29 [INFO] [stdout] | [INFO] [stdout] 266 | if !self_0.is_null() && ts_language_is_wasm(self_0) as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:265:1 [INFO] [stdout] | [INFO] [stdout] 265 | pub unsafe extern "C" fn ts_language_delete(mut self_0: *const TSLanguage) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::wasm_store::ts_wasm_language_release` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:267:9 [INFO] [stdout] | [INFO] [stdout] 267 | ts_wasm_language_release(self_0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:272:13 [INFO] [stdout] | [INFO] [stdout] 272 | return ((*self_0).symbol_count).wrapping_add((*self_0).alias_count); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:271:1 [INFO] [stdout] | [INFO] [stdout] 271 | pub unsafe extern "C" fn ts_language_symbol_count(mut self_0: *const TSLanguage) -> uint32_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:272:50 [INFO] [stdout] | [INFO] [stdout] 272 | return ((*self_0).symbol_count).wrapping_add((*self_0).alias_count); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:276:12 [INFO] [stdout] | [INFO] [stdout] 276 | return (*self_0).state_count; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:275:1 [INFO] [stdout] | [INFO] [stdout] 275 | pub unsafe extern "C" fn ts_language_state_count(mut self_0: *const TSLanguage) -> uint32_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:280:12 [INFO] [stdout] | [INFO] [stdout] 280 | return (*self_0).version; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:279:1 [INFO] [stdout] | [INFO] [stdout] 279 | pub unsafe extern "C" fn ts_language_version(mut self_0: *const TSLanguage) -> uint32_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:284:12 [INFO] [stdout] | [INFO] [stdout] 284 | return (*self_0).field_count; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:283:1 [INFO] [stdout] | [INFO] [stdout] 283 | pub unsafe extern "C" fn ts_language_field_count(mut self_0: *const TSLanguage) -> uint32_t { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:297:9 [INFO] [stdout] | [INFO] [stdout] 297 | (*result).action_count = 0 as libc::c_int as uint32_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:287:1 [INFO] [stdout] | [INFO] [stdout] 287 | / pub unsafe extern "C" fn ts_language_table_entry( [INFO] [stdout] 288 | | mut self_0: *const TSLanguage, [INFO] [stdout] 289 | | mut state: TSStateId, [INFO] [stdout] 290 | | mut symbol: TSSymbol, [INFO] [stdout] 291 | | mut result: *mut TableEntry, [INFO] [stdout] 292 | | ) { [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:298:9 [INFO] [stdout] | [INFO] [stdout] 298 | (*result).is_reusable = 0 as libc::c_int != 0; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:299:9 [INFO] [stdout] | [INFO] [stdout] 299 | (*result).actions = 0 as *const TSParseAction; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:301:39 [INFO] [stdout] | [INFO] [stdout] 301 | if (symbol as libc::c_uint) < (*self_0).token_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_lookup` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:305:42 [INFO] [stdout] | [INFO] [stdout] 305 | let mut action_index: uint32_t = ts_language_lookup(self_0, state, symbol) as uint32_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:307:14 [INFO] [stdout] | [INFO] [stdout] 307 | &*((*self_0).parse_actions).offset(action_index as isize) as *const TSParseActionEntry; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:307:15 [INFO] [stdout] | [INFO] [stdout] 307 | &*((*self_0).parse_actions).offset(action_index as isize) as *const TSParseActionEntry; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:307:16 [INFO] [stdout] | [INFO] [stdout] 307 | &*((*self_0).parse_actions).offset(action_index as isize) as *const TSParseActionEntry; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:308:9 [INFO] [stdout] | [INFO] [stdout] 308 | (*result).action_count = (*entry).entry.count as uint32_t; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:308:34 [INFO] [stdout] | [INFO] [stdout] 308 | (*result).action_count = (*entry).entry.count as uint32_t; [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:308:34 [INFO] [stdout] | [INFO] [stdout] 308 | (*result).action_count = (*entry).entry.count as uint32_t; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:309:9 [INFO] [stdout] | [INFO] [stdout] 309 | (*result).is_reusable = (*entry).entry.reusable; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:309:33 [INFO] [stdout] | [INFO] [stdout] 309 | (*result).is_reusable = (*entry).entry.reusable; [INFO] [stdout] | ^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:309:33 [INFO] [stdout] | [INFO] [stdout] 309 | (*result).is_reusable = (*entry).entry.reusable; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:310:9 [INFO] [stdout] | [INFO] [stdout] 310 | (*result).actions = entry.offset(1 as libc::c_int as isize) as *const TSParseAction; [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:310:29 [INFO] [stdout] | [INFO] [stdout] 310 | (*result).actions = entry.offset(1 as libc::c_int as isize) as *const TSParseAction; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:339:16 [INFO] [stdout] | [INFO] [stdout] 339 | return *((*self_0).symbol_metadata).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:314:1 [INFO] [stdout] | [INFO] [stdout] 314 | / pub unsafe extern "C" fn ts_language_symbol_metadata( [INFO] [stdout] 315 | | mut self_0: *const TSLanguage, [INFO] [stdout] 316 | | mut symbol: TSSymbol, [INFO] [stdout] 317 | | ) -> TSSymbolMetadata { [INFO] [stdout] | |_____________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:339:17 [INFO] [stdout] | [INFO] [stdout] 339 | return *((*self_0).symbol_metadata).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:339:18 [INFO] [stdout] | [INFO] [stdout] 339 | return *((*self_0).symbol_metadata).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:350:12 [INFO] [stdout] | [INFO] [stdout] 350 | return *((*self_0).public_symbol_map).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:343:1 [INFO] [stdout] | [INFO] [stdout] 343 | / pub unsafe extern "C" fn ts_language_public_symbol( [INFO] [stdout] 344 | | mut self_0: *const TSLanguage, [INFO] [stdout] 345 | | mut symbol: TSSymbol, [INFO] [stdout] 346 | | ) -> TSSymbol { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:350:13 [INFO] [stdout] | [INFO] [stdout] 350 | return *((*self_0).public_symbol_map).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:350:14 [INFO] [stdout] | [INFO] [stdout] 350 | return *((*self_0).public_symbol_map).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:363:42 [INFO] [stdout] | [INFO] [stdout] 363 | } else if (symbol as libc::c_uint) < (*self_0).token_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:353:1 [INFO] [stdout] | [INFO] [stdout] 353 | / pub unsafe extern "C" fn ts_language_next_state( [INFO] [stdout] 354 | | mut self_0: *const TSLanguage, [INFO] [stdout] 355 | | mut state: TSStateId, [INFO] [stdout] 356 | | mut symbol: TSSymbol, [INFO] [stdout] 357 | | ) -> TSStateId { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_actions` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:366:13 [INFO] [stdout] | [INFO] [stdout] 366 | ts_language_actions(self_0, state, symbol, &mut count); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:369:17 [INFO] [stdout] | [INFO] [stdout] 369 | *actions.offset(count.wrapping_sub(1 as libc::c_int as libc::c_uint) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:369:18 [INFO] [stdout] | [INFO] [stdout] 369 | *actions.offset(count.wrapping_sub(1 as libc::c_int as libc::c_uint) as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:370:16 [INFO] [stdout] | [INFO] [stdout] 370 | if action.type_ as libc::c_int == TSParseActionTypeShift as libc::c_int { [INFO] [stdout] | ^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:371:28 [INFO] [stdout] | [INFO] [stdout] 371 | return (if action.shift.extra as libc::c_int != 0 { [INFO] [stdout] | ^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:374:21 [INFO] [stdout] | [INFO] [stdout] 374 | action.shift.state as libc::c_int [INFO] [stdout] | ^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_lookup` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:380:16 [INFO] [stdout] | [INFO] [stdout] 380 | return ts_language_lookup(self_0, state, symbol); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_symbol_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:394:42 [INFO] [stdout] | [INFO] [stdout] 394 | } else if (symbol as libc::c_uint) < ts_language_symbol_count(self_0) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:384:1 [INFO] [stdout] | [INFO] [stdout] 384 | / pub unsafe extern "C" fn ts_language_symbol_name( [INFO] [stdout] 385 | | mut self_0: *const TSLanguage, [INFO] [stdout] 386 | | mut symbol: TSSymbol, [INFO] [stdout] 387 | | ) -> *const libc::c_char { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:395:16 [INFO] [stdout] | [INFO] [stdout] 395 | return *((*self_0).symbol_names).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:395:17 [INFO] [stdout] | [INFO] [stdout] 395 | return *((*self_0).symbol_names).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:395:18 [INFO] [stdout] | [INFO] [stdout] 395 | return *((*self_0).symbol_names).offset(symbol as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::util::strncmp` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:407:8 [INFO] [stdout] | [INFO] [stdout] 407 | if strncmp( [INFO] [stdout] | ________^ [INFO] [stdout] 408 | | string, [INFO] [stdout] 409 | | b"ERROR\0" as *const u8 as *const libc::c_char, [INFO] [stdout] 410 | | length as libc::c_ulong, [INFO] [stdout] 411 | | ) == 0 [INFO] [stdout] | |_____^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:401:1 [INFO] [stdout] | [INFO] [stdout] 401 | / pub unsafe extern "C" fn ts_language_symbol_for_name( [INFO] [stdout] 402 | | mut self_0: *const TSLanguage, [INFO] [stdout] 403 | | mut string: *const libc::c_char, [INFO] [stdout] 404 | | mut length: uint32_t, [INFO] [stdout] 405 | | mut is_named: bool, [INFO] [stdout] 406 | | ) -> TSSymbol { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_symbol_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:415:31 [INFO] [stdout] | [INFO] [stdout] 415 | let mut count: uint16_t = ts_language_symbol_count(self_0) as uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_symbol_metadata` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:418:46 [INFO] [stdout] | [INFO] [stdout] 418 | let mut metadata: TSSymbolMetadata = ts_language_symbol_metadata(self_0, i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:422:56 [INFO] [stdout] | [INFO] [stdout] 422 | let mut symbol_name: *const libc::c_char = *((*self_0).symbol_names).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:422:57 [INFO] [stdout] | [INFO] [stdout] 422 | let mut symbol_name: *const libc::c_char = *((*self_0).symbol_names).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:422:58 [INFO] [stdout] | [INFO] [stdout] 422 | let mut symbol_name: *const libc::c_char = *((*self_0).symbol_names).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::util::strncmp` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:423:16 [INFO] [stdout] | [INFO] [stdout] 423 | if strncmp(symbol_name, string, length as libc::c_ulong) == 0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:424:20 [INFO] [stdout] | [INFO] [stdout] 424 | && *symbol_name.offset(length as isize) == 0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:424:21 [INFO] [stdout] | [INFO] [stdout] 424 | && *symbol_name.offset(length as isize) == 0 [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:426:24 [INFO] [stdout] | [INFO] [stdout] 426 | return *((*self_0).public_symbol_map).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:426:25 [INFO] [stdout] | [INFO] [stdout] 426 | return *((*self_0).public_symbol_map).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:426:26 [INFO] [stdout] | [INFO] [stdout] 426 | return *((*self_0).public_symbol_map).offset(i as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_symbol_metadata` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:438:42 [INFO] [stdout] | [INFO] [stdout] 438 | let mut metadata: TSSymbolMetadata = ts_language_symbol_metadata(self_0, symbol); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:434:1 [INFO] [stdout] | [INFO] [stdout] 434 | / pub unsafe extern "C" fn ts_language_symbol_type( [INFO] [stdout] 435 | | mut self_0: *const TSLanguage, [INFO] [stdout] 436 | | mut symbol: TSSymbol, [INFO] [stdout] 437 | | ) -> TSSymbolType { [INFO] [stdout] | |_________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_field_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:452:31 [INFO] [stdout] | [INFO] [stdout] 452 | let mut count: uint32_t = ts_language_field_count(self_0); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn ts_language_field_name_for_id( [INFO] [stdout] 449 | | mut self_0: *const TSLanguage, [INFO] [stdout] 450 | | mut id: TSFieldId, [INFO] [stdout] 451 | | ) -> *const libc::c_char { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:454:16 [INFO] [stdout] | [INFO] [stdout] 454 | return *((*self_0).field_names).offset(id as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:454:17 [INFO] [stdout] | [INFO] [stdout] 454 | return *((*self_0).field_names).offset(id as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:454:18 [INFO] [stdout] | [INFO] [stdout] 454 | return *((*self_0).field_names).offset(id as isize); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_field_count` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:465:31 [INFO] [stdout] | [INFO] [stdout] 465 | let mut count: uint16_t = ts_language_field_count(self_0) as uint16_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:460:1 [INFO] [stdout] | [INFO] [stdout] 460 | / pub unsafe extern "C" fn ts_language_field_id_for_name( [INFO] [stdout] 461 | | mut self_0: *const TSLanguage, [INFO] [stdout] 462 | | mut name: *const libc::c_char, [INFO] [stdout] 463 | | mut name_length: uint32_t, [INFO] [stdout] 464 | | ) -> TSFieldId { [INFO] [stdout] | |______________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::util::strncmp` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:468:15 [INFO] [stdout] | [INFO] [stdout] 468 | match strncmp( [INFO] [stdout] | _______________^ [INFO] [stdout] 469 | | name, [INFO] [stdout] 470 | | *((*self_0).field_names).offset(i as isize), [INFO] [stdout] 471 | | name_length as libc::c_ulong, [INFO] [stdout] 472 | | ) { [INFO] [stdout] | |_________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:470:13 [INFO] [stdout] | [INFO] [stdout] 470 | *((*self_0).field_names).offset(i as isize), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:470:14 [INFO] [stdout] | [INFO] [stdout] 470 | *((*self_0).field_names).offset(i as isize), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:470:15 [INFO] [stdout] | [INFO] [stdout] 470 | *((*self_0).field_names).offset(i as isize), [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:474:20 [INFO] [stdout] | [INFO] [stdout] 474 | if *(*((*self_0).field_names).offset(i as isize)).offset(name_length as isize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:474:21 [INFO] [stdout] | [INFO] [stdout] 474 | if *(*((*self_0).field_names).offset(i as isize)).offset(name_length as isize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:474:21 [INFO] [stdout] | [INFO] [stdout] 474 | if *(*((*self_0).field_names).offset(i as isize)).offset(name_length as isize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:474:23 [INFO] [stdout] | [INFO] [stdout] 474 | if *(*((*self_0).field_names).offset(i as isize)).offset(name_length as isize) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:474:24 [INFO] [stdout] | [INFO] [stdout] 474 | if *(*((*self_0).field_names).offset(i as isize)).offset(name_length as isize) [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:493:33 [INFO] [stdout] | [INFO] [stdout] 493 | if state as libc::c_uint >= (*self_0).state_count { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:489:1 [INFO] [stdout] | [INFO] [stdout] 489 | / pub unsafe extern "C" fn ts_lookahead_iterator_new( [INFO] [stdout] 490 | | mut self_0: *const TSLanguage, [INFO] [stdout] 491 | | mut state: TSStateId, [INFO] [stdout] 492 | | ) -> *mut TSLookaheadIterator { [INFO] [stdout] | |_____________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_malloc` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:497:9 [INFO] [stdout] | [INFO] [stdout] 497 | crate::core::alloc::ts_malloc(::core::mem::size_of::() as libc::c_ulong) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:499:5 [INFO] [stdout] | [INFO] [stdout] 499 | *iterator = ts_language_lookaheads(self_0, state); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_lookaheads` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:499:17 [INFO] [stdout] | [INFO] [stdout] 499 | *iterator = ts_language_lookaheads(self_0, state); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::alloc::ts_free` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:504:5 [INFO] [stdout] | [INFO] [stdout] 504 | crate::core::alloc::ts_free(self_0 as *mut libc::c_void); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:503:1 [INFO] [stdout] | [INFO] [stdout] 503 | pub unsafe extern "C" fn ts_lookahead_iterator_delete(mut self_0: *mut TSLookaheadIterator) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:512:33 [INFO] [stdout] | [INFO] [stdout] 512 | if state as libc::c_uint >= (*(*iterator).language).state_count { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:507:1 [INFO] [stdout] | [INFO] [stdout] 507 | / pub unsafe extern "C" fn ts_lookahead_iterator_reset_state( [INFO] [stdout] 508 | | mut self_0: *mut TSLookaheadIterator, [INFO] [stdout] 509 | | mut state: TSStateId, [INFO] [stdout] 510 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:512:35 [INFO] [stdout] | [INFO] [stdout] 512 | if state as libc::c_uint >= (*(*iterator).language).state_count { [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:515:5 [INFO] [stdout] | [INFO] [stdout] 515 | *iterator = ts_language_lookaheads((*iterator).language, state); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_lookaheads` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:515:17 [INFO] [stdout] | [INFO] [stdout] 515 | *iterator = ts_language_lookaheads((*iterator).language, state); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:515:40 [INFO] [stdout] | [INFO] [stdout] 515 | *iterator = ts_language_lookaheads((*iterator).language, state); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:523:12 [INFO] [stdout] | [INFO] [stdout] 523 | return (*iterator).language; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:519:1 [INFO] [stdout] | [INFO] [stdout] 519 | / pub unsafe extern "C" fn ts_lookahead_iterator_language( [INFO] [stdout] 520 | | mut self_0: *const TSLookaheadIterator, [INFO] [stdout] 521 | | ) -> *const TSLanguage { [INFO] [stdout] | |______________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:531:33 [INFO] [stdout] | [INFO] [stdout] 531 | if state as libc::c_uint >= (*language).state_count { [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:526:1 [INFO] [stdout] | [INFO] [stdout] 526 | / pub unsafe extern "C" fn ts_lookahead_iterator_reset( [INFO] [stdout] 527 | | mut self_0: *mut TSLookaheadIterator, [INFO] [stdout] 528 | | mut language: *const TSLanguage, [INFO] [stdout] 529 | | mut state: TSStateId, [INFO] [stdout] 530 | | ) -> bool { [INFO] [stdout] | |_________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:535:5 [INFO] [stdout] | [INFO] [stdout] 535 | *iterator = ts_language_lookaheads(language, state); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_lookaheads` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:535:17 [INFO] [stdout] | [INFO] [stdout] 535 | *iterator = ts_language_lookaheads(language, state); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_lookahead_iterator__next` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:541:12 [INFO] [stdout] | [INFO] [stdout] 541 | return ts_lookahead_iterator__next(iterator); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:539:1 [INFO] [stdout] | [INFO] [stdout] 539 | pub unsafe extern "C" fn ts_lookahead_iterator_next(mut self_0: *mut TSLookaheadIterator) -> bool { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:548:12 [INFO] [stdout] | [INFO] [stdout] 548 | return (*iterator).symbol; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:544:1 [INFO] [stdout] | [INFO] [stdout] 544 | / pub unsafe extern "C" fn ts_lookahead_iterator_current_symbol( [INFO] [stdout] 545 | | mut self_0: *const TSLookaheadIterator, [INFO] [stdout] 546 | | ) -> TSSymbol { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core_wrapper::core::language::ts_language_symbol_name` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:555:12 [INFO] [stdout] | [INFO] [stdout] 555 | return ts_language_symbol_name((*iterator).language, (*iterator).symbol); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / pub unsafe extern "C" fn ts_lookahead_iterator_current_symbol_name( [INFO] [stdout] 552 | | mut self_0: *const TSLookaheadIterator, [INFO] [stdout] 553 | | ) -> *const libc::c_char { [INFO] [stdout] | |________________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:555:36 [INFO] [stdout] | [INFO] [stdout] 555 | return ts_language_symbol_name((*iterator).language, (*iterator).symbol); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/language.rs:555:58 [INFO] [stdout] | [INFO] [stdout] 555 | return ts_language_symbol_name((*iterator).language, (*iterator).symbol); [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:62:5 [INFO] [stdout] | [INFO] [stdout] 62 | *code_point = *string.offset(fresh0 as isize) as int32_t; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:54:1 [INFO] [stdout] | [INFO] [stdout] 54 | / unsafe extern "C" fn ts_decode_utf8( [INFO] [stdout] 55 | | mut string: *const uint8_t, [INFO] [stdout] 56 | | mut length: uint32_t, [INFO] [stdout] 57 | | mut code_point: *mut int32_t, [INFO] [stdout] 58 | | ) -> uint32_t { [INFO] [stdout] | |_____________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:62:19 [INFO] [stdout] | [INFO] [stdout] 62 | *code_point = *string.offset(fresh0 as isize) as int32_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> binding_rust/core_wrapper/core/lexer.rs:62:20 [INFO] [stdout] | [INFO] [stdout] 62 | *code_point = *string.offset(fresh0 as isize) as int32_t; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [WARN] too many lines in the log, truncating it