[INFO] fetching crate zarrs_ffi 0.8.3... [INFO] checking zarrs_ffi-0.8.3 against try#ccf408f4326a858c00dd845a64a86b16f360a801 for pr-129466-2 [INFO] extracting crate zarrs_ffi 0.8.3 into /workspace/builds/worker-6-tc2/source [INFO] validating manifest of crates.io crate zarrs_ffi 0.8.3 on toolchain ccf408f4326a858c00dd845a64a86b16f360a801 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate zarrs_ffi 0.8.3 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate zarrs_ffi 0.8.3 [INFO] tweaked toml for crates.io crate zarrs_ffi 0.8.3 written to /workspace/builds/worker-6-tc2/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Locking 167 packages to latest compatible versions [INFO] [stderr] Adding assert_cmd v1.0.8 (available: v2.0.16) [INFO] [stderr] Adding bindgen v0.69.4 (available: v0.70.1) [INFO] [stderr] Adding bstr v0.2.17 (available: v1.10.0) [INFO] [stderr] Adding float-cmp v0.9.0 (available: v0.10.0) [INFO] [stderr] Adding heck v0.4.1 (available: v0.5.0) [INFO] [stderr] Adding itertools v0.10.5 (available: v0.13.0) [INFO] [stderr] Adding itertools v0.12.1 (available: v0.13.0) [INFO] [stderr] Adding linux-raw-sys v0.4.14 (available: v0.6.5) [INFO] [stderr] Adding ndarray v0.15.6 (available: v0.16.1) [INFO] [stderr] Adding predicates v2.1.5 (available: v3.1.2) [INFO] [stderr] Adding regex-automata v0.1.10 (available: v0.4.7) [INFO] [stderr] Adding rustc-hash v1.1.0 (available: v2.0.0) [INFO] [stderr] Adding rustc_version v0.3.3 (available: v0.4.1) [INFO] [stderr] Adding semver v0.11.0 (available: v1.0.23) [INFO] [stderr] Adding target-lexicon v0.11.2 (available: v0.12.16) [INFO] [stderr] Adding termtree v0.4.1 (available: v0.5.1) [INFO] [stderr] Adding which v4.4.2 (available: v6.0.3) [INFO] [stderr] Adding windows-sys v0.52.0 (available: v0.59.0) [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] b68f1131943e3414fb84393e6a12296ce677dfa5f9e5ed9ff224e806f094b559 [INFO] running `Command { std: "docker" "start" "-a" "b68f1131943e3414fb84393e6a12296ce677dfa5f9e5ed9ff224e806f094b559", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "b68f1131943e3414fb84393e6a12296ce677dfa5f9e5ed9ff224e806f094b559", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b68f1131943e3414fb84393e6a12296ce677dfa5f9e5ed9ff224e806f094b559", kill_on_drop: false }` [INFO] [stdout] b68f1131943e3414fb84393e6a12296ce677dfa5f9e5ed9ff224e806f094b559 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+ccf408f4326a858c00dd845a64a86b16f360a801" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 6b1a0ec435dce54a595f656927af0e8a4aea3e7e2eab915fbadbfd3006797688 [INFO] running `Command { std: "docker" "start" "-a" "6b1a0ec435dce54a595f656927af0e8a4aea3e7e2eab915fbadbfd3006797688", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling proc-macro2 v1.0.86 [INFO] [stderr] Compiling libc v0.2.159 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling ucd-trie v0.1.6 [INFO] [stderr] Compiling crossbeam-utils v0.8.20 [INFO] [stderr] Compiling semver v1.0.23 [INFO] [stderr] Compiling rayon-core v1.12.1 [INFO] [stderr] Checking aho-corasick v1.1.3 [INFO] [stderr] Compiling matrixmultiply v0.3.9 [INFO] [stderr] Compiling rustc_version v0.4.1 [INFO] [stderr] Compiling lock_api v0.4.12 [INFO] [stderr] Compiling zstd-safe v7.2.1 [INFO] [stderr] Compiling crc32c v0.6.8 [INFO] [stderr] Compiling unicode-xid v0.2.6 [INFO] [stderr] Compiling jobserver v0.1.32 [INFO] [stderr] Compiling serde_json v1.0.128 [INFO] [stderr] Compiling rustix v0.38.37 [INFO] [stderr] Checking crossbeam-epoch v0.9.18 [INFO] [stderr] Compiling doc-comment v0.3.3 [INFO] [stderr] Checking predicates-core v1.0.8 [INFO] [stderr] Compiling cc v1.1.21 [INFO] [stderr] Compiling quote v1.0.37 [INFO] [stderr] Checking num-integer v0.1.46 [INFO] [stderr] Checking crossbeam-deque v0.8.5 [INFO] [stderr] Checking regex-automata v0.4.7 [INFO] [stderr] Checking adler2 v2.0.0 [INFO] [stderr] Checking rawpointer v0.2.1 [INFO] [stderr] Checking indexmap v2.5.0 [INFO] [stderr] Compiling syn v2.0.77 [INFO] [stderr] Checking num-bigint v0.4.6 [INFO] [stderr] Checking num-iter v0.1.45 [INFO] [stderr] Checking miniz_oxide v0.8.0 [INFO] [stderr] Checking rayon v1.10.0 [INFO] [stderr] Checking parking_lot_core v0.9.10 [INFO] [stderr] Checking float-cmp v0.9.0 [INFO] [stderr] Checking crc32fast v1.4.2 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Checking normalize-line-endings v0.3.0 [INFO] [stderr] Checking difflib v0.4.0 [INFO] [stderr] Checking termtree v0.4.1 [INFO] [stderr] Compiling target-lexicon v0.11.2 [INFO] [stderr] Checking regex-automata v0.1.10 [INFO] [stderr] Checking num-rational v0.4.2 [INFO] [stderr] Compiling zstd-sys v2.0.13+zstd.1.5.6 [INFO] [stderr] Compiling link-cplusplus v1.0.9 [INFO] [stderr] Compiling lz4-sys v1.11.1+lz4-1.10.0 [INFO] [stderr] Compiling libz-sys v1.1.20 [INFO] [stderr] Compiling snappy_src v0.2.3+snappy.1.2.1 [INFO] [stderr] Compiling blosc-src v0.3.4 [INFO] [stderr] Checking regex v1.10.6 [INFO] [stderr] Checking rayon_iter_concurrent_limit v0.2.0 [INFO] [stderr] Checking bstr v0.2.17 [INFO] [stderr] Checking predicates-tree v1.0.11 [INFO] [stderr] Checking predicates v2.1.5 [INFO] [stderr] Checking walkdir v2.5.0 [INFO] [stderr] Checking parking_lot v0.12.3 [INFO] [stderr] Checking flate2 v1.0.34 [INFO] [stderr] Checking itertools v0.13.0 [INFO] [stderr] Compiling zarrs_ffi v0.8.3 (/tmp/fixit) [INFO] [stderr] Migrating build.rs from 2021 edition to 2024 [INFO] [stderr] Compiling thiserror-impl v1.0.64 [INFO] [stderr] Compiling bytemuck_derive v1.7.1 [INFO] [stderr] Compiling serde_derive v1.0.210 [INFO] [stderr] Compiling derive_more-impl v1.0.0 [INFO] [stderr] Compiling monostate-impl v0.1.13 [INFO] [stderr] Compiling thiserror v1.0.64 [INFO] [stderr] Compiling pest v2.7.13 [INFO] [stderr] Compiling serde_repr v0.1.19 [INFO] [stderr] Checking bytemuck v1.18.0 [INFO] [stderr] Checking pathdiff v0.2.1 [INFO] [stderr] Checking inventory v0.3.15 [INFO] [stderr] Checking num-complex v0.4.6 [INFO] [stderr] Checking half v2.4.1 [INFO] [stderr] Checking shlex v1.3.0 [INFO] [stderr] Checking dyn-clone v1.0.17 [INFO] [stderr] Checking ffi-support v0.4.4 [INFO] [stderr] Checking num v0.4.3 [INFO] [stderr] Checking ndarray v0.15.6 [INFO] [stderr] Checking tempfile v3.12.0 [INFO] [stderr] Compiling semver-parser v0.10.2 [INFO] [stderr] Checking assert_cmd v1.0.8 [INFO] [stderr] Compiling semver v0.11.0 [INFO] [stderr] Checking derive_more v1.0.0 [INFO] [stderr] Compiling rustc_version v0.3.3 [INFO] [stderr] Compiling inline-c-macro v0.1.5 [INFO] [stderr] Compiling inline-c v0.1.7 [INFO] [stderr] Checking serde v1.0.210 [INFO] [stderr] Checking zstd v0.13.2 [INFO] [stderr] Checking monostate v0.1.13 [INFO] [stderr] Checking zarrs v0.16.4 [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `zarrs_ffi` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/array.rs [INFO] [stderr] * src/array/array_sharded.rs [INFO] [stderr] * src/array/array_write.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:32:6 [INFO] [stderr] | [INFO] [stderr] 32 | ($array:expr_2021, $fn:ident ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:42:6 [INFO] [stderr] | [INFO] [stderr] 42 | ($array:expr_2021, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:42:38 [INFO] [stderr] | [INFO] [stderr] 42 | ($array:expr_2021, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_sharded.rs:51:17 [INFO] [stderr] | [INFO] [stderr] 39 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 51 | unsafe { std::slice::from_raw_parts_mut(pInnerChunkGridShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_sharded.rs:85:17 [INFO] [stderr] | [INFO] [stderr] 73 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 85 | unsafe { std::slice::from_raw_parts_mut(pInnerChunkShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_write.rs:88:9 [INFO] [stderr] | [INFO] [stderr] 77 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 88 | unsafe { *LAST_ERROR = chunk_representation.unwrap_err_unchecked().to_string() }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:213:18 [INFO] [stderr] | [INFO] [stderr] 207 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 213 | let pShape = unsafe { std::slice::from_raw_parts_mut(pShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:279:13 [INFO] [stderr] | [INFO] [stderr] 271 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 279 | unsafe { std::slice::from_raw_parts_mut(pChunkGridShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:309:24 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 309 | let pSubsetStart = unsafe { std::slice::from_raw_parts(pSubsetStart, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:310:24 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 310 | let pSubsetShape = unsafe { std::slice::from_raw_parts(pSubsetShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:311:24 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 311 | let array_subset = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:316:28 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 316 | let pChunksStart = unsafe { std::slice::from_raw_parts_mut(pChunksStart, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:128:3 [INFO] [stdout] | [INFO] [stdout] 128 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 128 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read_write.rs:31:3 [INFO] [stdout] | [INFO] [stdout] 31 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 31 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/array.rs:318:28 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 318 | let pChunksShape = unsafe { std::slice::from_raw_parts_mut(pChunksShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:392:17 [INFO] [stderr] | [INFO] [stderr] 379 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 392 | unsafe { std::slice::from_raw_parts_mut(pChunkOrigin, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:429:17 [INFO] [stderr] | [INFO] [stderr] 416 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 429 | unsafe { std::slice::from_raw_parts_mut(pChunkShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 3 previous errors; 12 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:34:3 [INFO] [stdout] | [INFO] [stdout] 34 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 34 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:67:3 [INFO] [stdout] | [INFO] [stdout] 67 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 67 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:146:3 [INFO] [stdout] | [INFO] [stdout] 146 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 146 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:301:3 [INFO] [stdout] | [INFO] [stdout] 301 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 301 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:29:3 [INFO] [stdout] | [INFO] [stdout] 29 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 29 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:70:3 [INFO] [stdout] | [INFO] [stdout] 70 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 70 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:81:3 [INFO] [stdout] | [INFO] [stdout] 81 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 81 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:118:3 [INFO] [stdout] | [INFO] [stdout] 118 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 118 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:181:3 [INFO] [stdout] | [INFO] [stdout] 181 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 181 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:225:3 [INFO] [stdout] | [INFO] [stdout] 225 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 225 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:296:3 [INFO] [stdout] | [INFO] [stdout] 296 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 296 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:333:3 [INFO] [stdout] | [INFO] [stdout] 333 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 333 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:373:3 [INFO] [stdout] | [INFO] [stdout] 373 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 373 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:514:3 [INFO] [stdout] | [INFO] [stdout] 514 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 514 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:36:3 [INFO] [stdout] | [INFO] [stdout] 36 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 36 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:63:3 [INFO] [stdout] | [INFO] [stdout] 63 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 63 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:2:3 [INFO] [stdout] | [INFO] [stdout] 2 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:8:3 [INFO] [stdout] | [INFO] [stdout] 8 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 8 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:14:3 [INFO] [stdout] | [INFO] [stdout] 14 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 14 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:44:3 [INFO] [stdout] | [INFO] [stdout] 44 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 44 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:32:13 [INFO] [stdout] | [INFO] [stdout] 32 | ($array:expr, $fn:ident ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 32 | ($array:expr_2021, $fn:ident ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:42:13 [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr_2021, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:42:39 [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:61:19 [INFO] [stdout] | [INFO] [stdout] 61 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | / pub unsafe extern "C" fn zarrsArrayRetrieveChunk( [INFO] [stdout] 52 | | array: ZarrsArray, [INFO] [stdout] 53 | | dimensionality: usize, [INFO] [stdout] 54 | | pChunkIndices: *const u64, [INFO] [stdout] 55 | | chunkBytesCount: usize, [INFO] [stdout] 56 | | pChunkBytes: *mut u8, [INFO] [stdout] 57 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:62:25 [INFO] [stdout] | [INFO] [stdout] 62 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:79:14 [INFO] [stdout] | [INFO] [stdout] 79 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:141:19 [INFO] [stdout] | [INFO] [stdout] 141 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:129:1 [INFO] [stdout] | [INFO] [stdout] 129 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubset( [INFO] [stdout] 130 | | array: ZarrsArray, [INFO] [stdout] 131 | | dimensionality: usize, [INFO] [stdout] 132 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 135 | | pSubsetBytes: *mut u8, [INFO] [stdout] 136 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:142:24 [INFO] [stdout] | [INFO] [stdout] 142 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:143:24 [INFO] [stdout] | [INFO] [stdout] 143 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:145:9 [INFO] [stdout] | [INFO] [stdout] 145 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:162:14 [INFO] [stdout] | [INFO] [stdout] 162 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read_write.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | / pub unsafe extern "C" fn zarrsArrayStoreSubset( [INFO] [stdout] 33 | | array: ZarrsArray, [INFO] [stdout] 34 | | dimensionality: usize, [INFO] [stdout] 35 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 38 | | pSubsetBytes: *const u8, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:45:24 [INFO] [stdout] | [INFO] [stdout] 45 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:46:24 [INFO] [stdout] | [INFO] [stdout] 46 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:47:24 [INFO] [stdout] | [INFO] [stdout] 47 | let subset_bytes = std::slice::from_raw_parts(pSubsetBytes, subsetBytesCount); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:49:9 [INFO] [stdout] | [INFO] [stdout] 49 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:56:14 [INFO] [stdout] | [INFO] [stdout] 56 | *LAST_ERROR = "storage does not have read/write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkGridShape( [INFO] [stdout] 36 | | array: ZarrsArray, [INFO] [stdout] 37 | | dimensionality: usize, [INFO] [stdout] 38 | | pInnerChunkGridShape: *mut u64, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:78:19 [INFO] [stdout] | [INFO] [stdout] 78 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkShape( [INFO] [stdout] 69 | | array: ZarrsArray, [INFO] [stdout] 70 | | dimensionality: usize, [INFO] [stdout] 71 | | pIsSharded: *mut bool, [INFO] [stdout] 72 | | pInnerChunkShape: *mut u64, [INFO] [stdout] 73 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:87:13 [INFO] [stdout] | [INFO] [stdout] 87 | *pIsSharded = true; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | *pIsSharded = false; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:112:19 [INFO] [stdout] | [INFO] [stdout] 112 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn zarrsCreateShardIndexCache( [INFO] [stdout] 105 | | array: ZarrsArray, [INFO] [stdout] 106 | | pShardIndexCache: *mut ZarrsShardIndexCache, [INFO] [stdout] 107 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:126:13 [INFO] [stdout] | [INFO] [stdout] 126 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:131:14 [INFO] [stdout] | [INFO] [stdout] 131 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:214:19 [INFO] [stdout] | [INFO] [stdout] 214 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayRetrieveInnerChunk( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 206 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 209 | | pChunkBytes: *mut u8, [INFO] [stdout] 210 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:215:19 [INFO] [stdout] | [INFO] [stdout] 215 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:216:25 [INFO] [stdout] | [INFO] [stdout] 216 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:249:14 [INFO] [stdout] | [INFO] [stdout] 249 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:315:19 [INFO] [stdout] | [INFO] [stdout] 315 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:302:1 [INFO] [stdout] | [INFO] [stdout] 302 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubsetSharded( [INFO] [stdout] 303 | | array: ZarrsArray, [INFO] [stdout] 304 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 305 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 309 | | pSubsetBytes: *mut u8, [INFO] [stdout] 310 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:316:19 [INFO] [stdout] | [INFO] [stdout] 316 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:317:24 [INFO] [stdout] | [INFO] [stdout] 317 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:318:24 [INFO] [stdout] | [INFO] [stdout] 318 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:320:9 [INFO] [stdout] | [INFO] [stdout] 320 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:353:14 [INFO] [stdout] | [INFO] [stdout] 353 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:34:19 [INFO] [stdout] | [INFO] [stdout] 34 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe extern "C" fn zarrsArrayStoreMetadata(array: ZarrsArray) -> ZarrsResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:82:19 [INFO] [stdout] | [INFO] [stdout] 82 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | / pub unsafe extern "C" fn zarrsArrayStoreChunk( [INFO] [stdout] 72 | | array: ZarrsArray, [INFO] [stdout] 73 | | dimensionality: usize, [INFO] [stdout] 74 | | pChunkIndices: *const u64, [INFO] [stdout] 75 | | chunkBytesCount: usize, [INFO] [stdout] 76 | | pChunkBytes: *const u8, [INFO] [stdout] 77 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:83:25 [INFO] [stdout] | [INFO] [stdout] 83 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:84:23 [INFO] [stdout] | [INFO] [stdout] 84 | let chunk_bytes = std::slice::from_raw_parts(pChunkBytes, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:92:10 [INFO] [stdout] | [INFO] [stdout] 92 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | *LAST_ERROR = [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:88:10 [INFO] [stdout] | [INFO] [stdout] 88 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / pub unsafe extern "C" fn zarrsOpenArrayRW( [INFO] [stdout] 83 | | storage: ZarrsStorage, [INFO] [stdout] 84 | | path: FfiStr, [INFO] [stdout] 85 | | pArray: *mut ZarrsArray, [INFO] [stdout] 86 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:92:21 [INFO] [stdout] | [INFO] [stdout] 92 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:97:17 [INFO] [stdout] | [INFO] [stdout] 97 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:101:18 [INFO] [stdout] | [INFO] [stdout] 101 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:106:10 [INFO] [stdout] | [INFO] [stdout] 106 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:126:10 [INFO] [stdout] | [INFO] [stdout] 126 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | / pub unsafe extern "C" fn zarrsCreateArrayRW( [INFO] [stdout] 120 | | storage: ZarrsStorage, [INFO] [stdout] 121 | | path: FfiStr, [INFO] [stdout] 122 | | metadata: FfiStr, [INFO] [stdout] 123 | | pArray: *mut ZarrsArray, [INFO] [stdout] 124 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:130:21 [INFO] [stdout] | [INFO] [stdout] 130 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:135:14 [INFO] [stdout] | [INFO] [stdout] 135 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:143:17 [INFO] [stdout] | [INFO] [stdout] 143 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:147:18 [INFO] [stdout] | [INFO] [stdout] 147 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:152:10 [INFO] [stdout] | [INFO] [stdout] 152 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:189:19 [INFO] [stdout] | [INFO] [stdout] 189 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:182:1 [INFO] [stdout] | [INFO] [stdout] 182 | / pub unsafe extern "C" fn zarrsArrayGetDimensionality( [INFO] [stdout] 183 | | array: ZarrsArray, [INFO] [stdout] 184 | | dimensionality: *mut usize, [INFO] [stdout] 185 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | *dimensionality = array_fn!(array, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:211:19 [INFO] [stdout] | [INFO] [stdout] 211 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayGetShape( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | dimensionality: usize, [INFO] [stdout] 206 | | pShape: *mut u64, [INFO] [stdout] 207 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:233:19 [INFO] [stdout] | [INFO] [stdout] 233 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:226:1 [INFO] [stdout] | [INFO] [stdout] 226 | / pub unsafe extern "C" fn zarrsArrayGetDataType( [INFO] [stdout] 227 | | array: ZarrsArray, [INFO] [stdout] 228 | | pDataType: *mut ZarrsDataType, [INFO] [stdout] 229 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | *pDataType = match data_type { [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:275:19 [INFO] [stdout] | [INFO] [stdout] 275 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | / pub unsafe extern "C" fn zarrsArrayGetChunkGridShape( [INFO] [stdout] 268 | | array: ZarrsArray, [INFO] [stdout] 269 | | dimensionality: usize, [INFO] [stdout] 270 | | pChunkGridShape: *mut u64, [INFO] [stdout] 271 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:308:19 [INFO] [stdout] | [INFO] [stdout] 308 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:297:1 [INFO] [stdout] | [INFO] [stdout] 297 | / pub unsafe extern "C" fn zarrsArrayGetChunksInSubset( [INFO] [stdout] 298 | | array: ZarrsArray, [INFO] [stdout] 299 | | dimensionality: usize, [INFO] [stdout] 300 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 303 | | pChunksShape: *mut u64, [INFO] [stdout] 304 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:344:19 [INFO] [stdout] | [INFO] [stdout] 344 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:334:1 [INFO] [stdout] | [INFO] [stdout] 334 | / pub unsafe extern "C" fn zarrsArrayGetChunkSize( [INFO] [stdout] 335 | | array: ZarrsArray, [INFO] [stdout] 336 | | dimensionality: usize, [INFO] [stdout] 337 | | pChunkIndices: *const u64, [INFO] [stdout] 338 | | chunkSize: *mut usize, [INFO] [stdout] 339 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:345:25 [INFO] [stdout] | [INFO] [stdout] 345 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:352:17 [INFO] [stdout] | [INFO] [stdout] 352 | *chunkSize = chunk_size; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:355:18 [INFO] [stdout] | [INFO] [stdout] 355 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:360:14 [INFO] [stdout] | [INFO] [stdout] 360 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:384:19 [INFO] [stdout] | [INFO] [stdout] 384 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:374:1 [INFO] [stdout] | [INFO] [stdout] 374 | / pub unsafe extern "C" fn zarrsArrayGetChunkOrigin( [INFO] [stdout] 375 | | array: ZarrsArray, [INFO] [stdout] 376 | | dimensionality: usize, [INFO] [stdout] 377 | | pChunkIndices: *const u64, [INFO] [stdout] 378 | | pChunkOrigin: *mut u64, [INFO] [stdout] 379 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:385:25 [INFO] [stdout] | [INFO] [stdout] 385 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:397:14 [INFO] [stdout] | [INFO] [stdout] 397 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:421:19 [INFO] [stdout] | [INFO] [stdout] 421 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn zarrsArrayGetChunkShape( [INFO] [stdout] 412 | | array: ZarrsArray, [INFO] [stdout] 413 | | dimensionality: usize, [INFO] [stdout] 414 | | pChunkIndices: *const u64, [INFO] [stdout] 415 | | pChunkShape: *mut u64, [INFO] [stdout] 416 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:422:25 [INFO] [stdout] | [INFO] [stdout] 422 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:434:14 [INFO] [stdout] | [INFO] [stdout] 434 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:458:19 [INFO] [stdout] | [INFO] [stdout] 458 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn zarrsArrayGetSubsetSize( [INFO] [stdout] 449 | | array: ZarrsArray, [INFO] [stdout] 450 | | dimensionality: usize, [INFO] [stdout] 451 | | pSubsetShape: *const u64, [INFO] [stdout] 452 | | subsetSize: *mut usize, [INFO] [stdout] 453 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:459:24 [INFO] [stdout] | [INFO] [stdout] 459 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:464:10 [INFO] [stdout] | [INFO] [stdout] 464 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | *subsetSize = usize::try_from(subset_shape.iter().product::()).unwrap() * data_type_size; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:489:19 [INFO] [stdout] | [INFO] [stdout] 489 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn zarrsArrayGetMetadataString( [INFO] [stdout] 481 | | array: ZarrsArray, [INFO] [stdout] 482 | | pretty: bool, [INFO] [stdout] 483 | | pMetadataString: *mut *mut c_char, [INFO] [stdout] 484 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:499:13 [INFO] [stdout] | [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:504:6 [INFO] [stdout] | [INFO] [stdout] 504 | *LAST_ERROR = "error converting metadata to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:524:19 [INFO] [stdout] | [INFO] [stdout] 524 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:515:1 [INFO] [stdout] | [INFO] [stdout] 515 | / pub unsafe extern "C" fn zarrsArrayGetAttributesString( [INFO] [stdout] 516 | | array: ZarrsArray, [INFO] [stdout] 517 | | pretty: bool, [INFO] [stdout] 518 | | pAttributesString: *mut *mut c_char, [INFO] [stdout] 519 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:534:13 [INFO] [stdout] | [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:539:6 [INFO] [stdout] | [INFO] [stdout] 539 | *LAST_ERROR = "error converting attributes to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:559:23 [INFO] [stdout] | [INFO] [stdout] 559 | let array = &mut **array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / pub unsafe extern "C" fn zarrsArraySetAttributes( [INFO] [stdout] 552 | | array: ZarrsArray, [INFO] [stdout] 553 | | attributes: FfiStr, [INFO] [stdout] 554 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:565:10 [INFO] [stdout] | [INFO] [stdout] 565 | *LAST_ERROR = "error interpreting attributes to a json map".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | *pStorage = Box::into_raw(Box::new(ZarrsStorage_T(ZarrsStorageEnum::RW(Arc::new( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/storage.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | / pub unsafe extern "C" fn zarrsCreateStorageFilesystem( [INFO] [stdout] 38 | | path: FfiStr, [INFO] [stdout] 39 | | pStorage: *mut ZarrsStorage, [INFO] [stdout] 40 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:50:14 [INFO] [stdout] | [INFO] [stdout] 50 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array.rs:498:12 [INFO] [stdout] | [INFO] [stdout] 498 | if let Ok(cstring) = CString::new(metadata_str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^-------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array.rs:501:9 [INFO] [stdout] | [INFO] [stdout] 501 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 498 ~ match CString::new(metadata_str) { Ok(cstring) => { [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] 500 | return ZarrsResult::ZARRS_SUCCESS; [INFO] [stdout] 501 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array.rs:533:12 [INFO] [stdout] | [INFO] [stdout] 533 | if let Ok(cstring) = CString::new(attributes_str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array.rs:536:9 [INFO] [stdout] | [INFO] [stdout] 536 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 533 ~ match CString::new(attributes_str) { Ok(cstring) => { [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] 535 | return ZarrsResult::ZARRS_SUCCESS; [INFO] [stdout] 536 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array/array_read_write.rs:12:8 [INFO] [stdout] | [INFO] [stdout] 12 | if let Err(err) = array.store_array_subset(array_subset, subset_bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array/array_read_write.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 12 ~ match array.store_array_subset(array_subset, subset_bytes) { Err(err) => { [INFO] [stdout] 13 | unsafe { *LAST_ERROR = err.to_string() }; [INFO] [stdout] 14 | ZarrsResult::ZARRS_ERROR_ARRAY [INFO] [stdout] 15 ~ } _ => { [INFO] [stdout] 16 | ZarrsResult::ZARRS_SUCCESS [INFO] [stdout] 17 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array/array_write.rs:51:8 [INFO] [stdout] | [INFO] [stdout] 51 | if let Err(err) = array.store_chunk(chunk_indices, chunk_bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^--------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array/array_write.rs:54:5 [INFO] [stdout] | [INFO] [stdout] 54 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 51 ~ match array.store_chunk(chunk_indices, chunk_bytes) { Err(err) => { [INFO] [stdout] 52 | unsafe { *LAST_ERROR = err.to_string() }; [INFO] [stdout] 53 | ZarrsResult::ZARRS_ERROR_ARRAY [INFO] [stdout] 54 ~ } _ => { [INFO] [stdout] 55 | ZarrsResult::ZARRS_SUCCESS [INFO] [stdout] 56 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 125 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Migrating tests/array.rs from 2021 edition to 2024 [INFO] [stderr] warning: failed to automatically apply fixes suggested by rustc to crate `zarrs_ffi` [INFO] [stderr] [INFO] [stderr] after fixes were automatically applied the compiler reported errors within these files: [INFO] [stderr] [INFO] [stderr] * src/array.rs [INFO] [stderr] * src/array/array_sharded.rs [INFO] [stderr] * src/array/array_write.rs [INFO] [stderr] [INFO] [stderr] This likely indicates a bug in either rustc or cargo itself, [INFO] [stderr] and we would appreciate a bug report! You're likely to see [INFO] [stderr] a number of compiler warnings after this message which cargo [INFO] [stderr] attempted to fix but failed. If you could open an issue at [INFO] [stderr] https://github.com/rust-lang/rust/issues [INFO] [stderr] quoting the full output of this command we'd be very appreciative! [INFO] [stderr] Note that you may be able to make some more progress in the near-term [INFO] [stderr] fixing code with the `--broken-code` flag [INFO] [stderr] [INFO] [stderr] The following errors were reported: [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:32:6 [INFO] [stderr] | [INFO] [stderr] 32 | ($array:expr_2021, $fn:ident ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:42:6 [INFO] [stderr] | [INFO] [stderr] 42 | ($array:expr_2021, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] error[E0658]: fragment specifier `expr_2021` is unstable [INFO] [stderr] --> src/array.rs:42:38 [INFO] [stderr] | [INFO] [stderr] 42 | ($array:expr_2021, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stderr] | ^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: see issue #123742 for more information [INFO] [stderr] = help: add `#![feature(expr_fragment_specifier_2024)]` to the crate attributes to enable [INFO] [stderr] = note: this compiler was built on 2024-09-17; consider upgrading it if it is out of date [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_sharded.rs:51:17 [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] = note: `--force-warn unsafe-attr-outside-unsafe` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:128:3 [INFO] [stdout] | [INFO] [stdout] 128 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 128 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 39 | ) -> ZarrsResult { unsafe { [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read_write.rs:31:3 [INFO] [stdout] | [INFO] [stdout] 31 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 31 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 51 | unsafe { std::slice::from_raw_parts_mut(pInnerChunkGridShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_unsafe)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_sharded.rs:85:17 [INFO] [stderr] | [INFO] [stderr] 73 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 85 | unsafe { std::slice::from_raw_parts_mut(pInnerChunkShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array/array_write.rs:88:9 [INFO] [stderr] | [INFO] [stderr] 77 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 88 | unsafe { *LAST_ERROR = chunk_representation.unwrap_err_unchecked().to_string() }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:213:18 [INFO] [stderr] | [INFO] [stderr] 207 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 213 | let pShape = unsafe { std::slice::from_raw_parts_mut(pShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:279:13 [INFO] [stderr] | [INFO] [stderr] 271 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 279 | unsafe { std::slice::from_raw_parts_mut(pChunkGridShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:34:3 [INFO] [stdout] | [INFO] [stdout] 34 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 34 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:67:3 [INFO] [stdout] | [INFO] [stdout] 67 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 67 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] --> src/array.rs:309:24 [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:146:3 [INFO] [stdout] | [INFO] [stdout] 146 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 146 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:301:3 [INFO] [stdout] | [INFO] [stdout] 301 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 301 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] ... [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:29:3 [INFO] [stdout] | [INFO] [stdout] 29 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 29 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] 309 | let pSubsetStart = unsafe { std::slice::from_raw_parts(pSubsetStart, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:310:24 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 310 | let pSubsetShape = unsafe { std::slice::from_raw_parts(pSubsetShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:311:24 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 311 | let array_subset = unsafe { [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:316:28 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 316 | let pChunksStart = unsafe { std::slice::from_raw_parts_mut(pChunksStart, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:318:28 [INFO] [stderr] | [INFO] [stderr] 304 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 318 | let pChunksShape = unsafe { std::slice::from_raw_parts_mut(pChunksShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:392:17 [INFO] [stderr] | [INFO] [stderr] 379 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 392 | unsafe { std::slice::from_raw_parts_mut(pChunkOrigin, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] warning: unnecessary `unsafe` block [INFO] [stderr] --> src/array.rs:429:17 [INFO] [stderr] | [INFO] [stderr] 416 | ) -> ZarrsResult { unsafe { [INFO] [stderr] | ------ because it's nested under this `unsafe` block [INFO] [stderr] ... [INFO] [stderr] 429 | unsafe { std::slice::from_raw_parts_mut(pChunkShape, dimensionality) }; [INFO] [stderr] | ^^^^^^ unnecessary `unsafe` block [INFO] [stderr] [INFO] [stderr] error: aborting due to 3 previous errors; 12 warnings emitted [INFO] [stderr] [INFO] [stderr] For more information about this error, try `rustc --explain E0658`. [INFO] [stderr] Original diagnostics will follow. [INFO] [stderr] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:70:3 [INFO] [stdout] | [INFO] [stdout] 70 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 70 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:81:3 [INFO] [stdout] | [INFO] [stdout] 81 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 81 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:118:3 [INFO] [stdout] | [INFO] [stdout] 118 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 118 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:181:3 [INFO] [stdout] | [INFO] [stdout] 181 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 181 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:225:3 [INFO] [stdout] | [INFO] [stdout] 225 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 225 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:296:3 [INFO] [stdout] | [INFO] [stdout] 296 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 296 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:333:3 [INFO] [stdout] | [INFO] [stdout] 333 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 333 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:373:3 [INFO] [stdout] | [INFO] [stdout] 373 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 373 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:514:3 [INFO] [stdout] | [INFO] [stdout] 514 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 514 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:36:3 [INFO] [stdout] | [INFO] [stdout] 36 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 36 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:63:3 [INFO] [stdout] | [INFO] [stdout] 63 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 63 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:2:3 [INFO] [stdout] | [INFO] [stdout] 2 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:8:3 [INFO] [stdout] | [INFO] [stdout] 8 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 8 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:14:3 [INFO] [stdout] | [INFO] [stdout] 14 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 14 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:44:3 [INFO] [stdout] | [INFO] [stdout] 44 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 44 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! [INFO] [stdout] = note: for more information, see issue #123757 [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:32:13 [INFO] [stdout] | [INFO] [stdout] 32 | ($array:expr, $fn:ident ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] = note: `--force-warn edition-2024-expr-fragment-specifier` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 32 | ($array:expr_2021, $fn:ident ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:42:13 [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr_2021, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: the `expr` fragment specifier will accept more expressions in the 2024 edition [INFO] [stdout] --> src/array.rs:42:39 [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr ),* ) => { [INFO] [stdout] | ^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see Migration Guide [INFO] [stdout] help: to keep the existing behavior, use the `expr_2021` fragment specifier [INFO] [stdout] | [INFO] [stdout] 42 | ($array:expr, $fn:ident, $( $args:expr_2021 ),* ) => { [INFO] [stdout] | ~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:61:19 [INFO] [stdout] | [INFO] [stdout] 61 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | / pub unsafe extern "C" fn zarrsArrayRetrieveChunk( [INFO] [stdout] 52 | | array: ZarrsArray, [INFO] [stdout] 53 | | dimensionality: usize, [INFO] [stdout] 54 | | pChunkIndices: *const u64, [INFO] [stdout] 55 | | chunkBytesCount: usize, [INFO] [stdout] 56 | | pChunkBytes: *mut u8, [INFO] [stdout] 57 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] = note: `--force-warn unsafe-op-in-unsafe-fn` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:62:25 [INFO] [stdout] | [INFO] [stdout] 62 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:79:14 [INFO] [stdout] | [INFO] [stdout] 79 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:141:19 [INFO] [stdout] | [INFO] [stdout] 141 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:129:1 [INFO] [stdout] | [INFO] [stdout] 129 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubset( [INFO] [stdout] 130 | | array: ZarrsArray, [INFO] [stdout] 131 | | dimensionality: usize, [INFO] [stdout] 132 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 135 | | pSubsetBytes: *mut u8, [INFO] [stdout] 136 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:142:24 [INFO] [stdout] | [INFO] [stdout] 142 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:143:24 [INFO] [stdout] | [INFO] [stdout] 143 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:145:9 [INFO] [stdout] | [INFO] [stdout] 145 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:162:14 [INFO] [stdout] | [INFO] [stdout] 162 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read_write.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | / pub unsafe extern "C" fn zarrsArrayStoreSubset( [INFO] [stdout] 33 | | array: ZarrsArray, [INFO] [stdout] 34 | | dimensionality: usize, [INFO] [stdout] 35 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 38 | | pSubsetBytes: *const u8, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:45:24 [INFO] [stdout] | [INFO] [stdout] 45 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:46:24 [INFO] [stdout] | [INFO] [stdout] 46 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:47:24 [INFO] [stdout] | [INFO] [stdout] 47 | let subset_bytes = std::slice::from_raw_parts(pSubsetBytes, subsetBytesCount); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:49:9 [INFO] [stdout] | [INFO] [stdout] 49 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:56:14 [INFO] [stdout] | [INFO] [stdout] 56 | *LAST_ERROR = "storage does not have read/write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkGridShape( [INFO] [stdout] 36 | | array: ZarrsArray, [INFO] [stdout] 37 | | dimensionality: usize, [INFO] [stdout] 38 | | pInnerChunkGridShape: *mut u64, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:78:19 [INFO] [stdout] | [INFO] [stdout] 78 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkShape( [INFO] [stdout] 69 | | array: ZarrsArray, [INFO] [stdout] 70 | | dimensionality: usize, [INFO] [stdout] 71 | | pIsSharded: *mut bool, [INFO] [stdout] 72 | | pInnerChunkShape: *mut u64, [INFO] [stdout] 73 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:87:13 [INFO] [stdout] | [INFO] [stdout] 87 | *pIsSharded = true; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | *pIsSharded = false; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:112:19 [INFO] [stdout] | [INFO] [stdout] 112 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn zarrsCreateShardIndexCache( [INFO] [stdout] 105 | | array: ZarrsArray, [INFO] [stdout] 106 | | pShardIndexCache: *mut ZarrsShardIndexCache, [INFO] [stdout] 107 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:126:13 [INFO] [stdout] | [INFO] [stdout] 126 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:131:14 [INFO] [stdout] | [INFO] [stdout] 131 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:214:19 [INFO] [stdout] | [INFO] [stdout] 214 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayRetrieveInnerChunk( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 206 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 209 | | pChunkBytes: *mut u8, [INFO] [stdout] 210 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:215:19 [INFO] [stdout] | [INFO] [stdout] 215 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:216:25 [INFO] [stdout] | [INFO] [stdout] 216 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:249:14 [INFO] [stdout] | [INFO] [stdout] 249 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:315:19 [INFO] [stdout] | [INFO] [stdout] 315 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:302:1 [INFO] [stdout] | [INFO] [stdout] 302 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubsetSharded( [INFO] [stdout] 303 | | array: ZarrsArray, [INFO] [stdout] 304 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 305 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 309 | | pSubsetBytes: *mut u8, [INFO] [stdout] 310 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:316:19 [INFO] [stdout] | [INFO] [stdout] 316 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:317:24 [INFO] [stdout] | [INFO] [stdout] 317 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:318:24 [INFO] [stdout] | [INFO] [stdout] 318 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:320:9 [INFO] [stdout] | [INFO] [stdout] 320 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:353:14 [INFO] [stdout] | [INFO] [stdout] 353 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:34:19 [INFO] [stdout] | [INFO] [stdout] 34 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe extern "C" fn zarrsArrayStoreMetadata(array: ZarrsArray) -> ZarrsResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:82:19 [INFO] [stdout] | [INFO] [stdout] 82 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | / pub unsafe extern "C" fn zarrsArrayStoreChunk( [INFO] [stdout] 72 | | array: ZarrsArray, [INFO] [stdout] 73 | | dimensionality: usize, [INFO] [stdout] 74 | | pChunkIndices: *const u64, [INFO] [stdout] 75 | | chunkBytesCount: usize, [INFO] [stdout] 76 | | pChunkBytes: *const u8, [INFO] [stdout] 77 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:83:25 [INFO] [stdout] | [INFO] [stdout] 83 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:84:23 [INFO] [stdout] | [INFO] [stdout] 84 | let chunk_bytes = std::slice::from_raw_parts(pChunkBytes, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:92:10 [INFO] [stdout] | [INFO] [stdout] 92 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | *LAST_ERROR = [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:88:10 [INFO] [stdout] | [INFO] [stdout] 88 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / pub unsafe extern "C" fn zarrsOpenArrayRW( [INFO] [stdout] 83 | | storage: ZarrsStorage, [INFO] [stdout] 84 | | path: FfiStr, [INFO] [stdout] 85 | | pArray: *mut ZarrsArray, [INFO] [stdout] 86 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:92:21 [INFO] [stdout] | [INFO] [stdout] 92 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:97:17 [INFO] [stdout] | [INFO] [stdout] 97 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:101:18 [INFO] [stdout] | [INFO] [stdout] 101 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:106:10 [INFO] [stdout] | [INFO] [stdout] 106 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:126:10 [INFO] [stdout] | [INFO] [stdout] 126 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | / pub unsafe extern "C" fn zarrsCreateArrayRW( [INFO] [stdout] 120 | | storage: ZarrsStorage, [INFO] [stdout] 121 | | path: FfiStr, [INFO] [stdout] 122 | | metadata: FfiStr, [INFO] [stdout] 123 | | pArray: *mut ZarrsArray, [INFO] [stdout] 124 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:130:21 [INFO] [stdout] | [INFO] [stdout] 130 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:135:14 [INFO] [stdout] | [INFO] [stdout] 135 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:143:17 [INFO] [stdout] | [INFO] [stdout] 143 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:147:18 [INFO] [stdout] | [INFO] [stdout] 147 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:152:10 [INFO] [stdout] | [INFO] [stdout] 152 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:189:19 [INFO] [stdout] | [INFO] [stdout] 189 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:182:1 [INFO] [stdout] | [INFO] [stdout] 182 | / pub unsafe extern "C" fn zarrsArrayGetDimensionality( [INFO] [stdout] 183 | | array: ZarrsArray, [INFO] [stdout] 184 | | dimensionality: *mut usize, [INFO] [stdout] 185 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | *dimensionality = array_fn!(array, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:211:19 [INFO] [stdout] | [INFO] [stdout] 211 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayGetShape( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | dimensionality: usize, [INFO] [stdout] 206 | | pShape: *mut u64, [INFO] [stdout] 207 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:233:19 [INFO] [stdout] | [INFO] [stdout] 233 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:226:1 [INFO] [stdout] | [INFO] [stdout] 226 | / pub unsafe extern "C" fn zarrsArrayGetDataType( [INFO] [stdout] 227 | | array: ZarrsArray, [INFO] [stdout] 228 | | pDataType: *mut ZarrsDataType, [INFO] [stdout] 229 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | *pDataType = match data_type { [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:275:19 [INFO] [stdout] | [INFO] [stdout] 275 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | / pub unsafe extern "C" fn zarrsArrayGetChunkGridShape( [INFO] [stdout] 268 | | array: ZarrsArray, [INFO] [stdout] 269 | | dimensionality: usize, [INFO] [stdout] 270 | | pChunkGridShape: *mut u64, [INFO] [stdout] 271 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:308:19 [INFO] [stdout] | [INFO] [stdout] 308 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:297:1 [INFO] [stdout] | [INFO] [stdout] 297 | / pub unsafe extern "C" fn zarrsArrayGetChunksInSubset( [INFO] [stdout] 298 | | array: ZarrsArray, [INFO] [stdout] 299 | | dimensionality: usize, [INFO] [stdout] 300 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 303 | | pChunksShape: *mut u64, [INFO] [stdout] 304 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:344:19 [INFO] [stdout] | [INFO] [stdout] 344 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:334:1 [INFO] [stdout] | [INFO] [stdout] 334 | / pub unsafe extern "C" fn zarrsArrayGetChunkSize( [INFO] [stdout] 335 | | array: ZarrsArray, [INFO] [stdout] 336 | | dimensionality: usize, [INFO] [stdout] 337 | | pChunkIndices: *const u64, [INFO] [stdout] 338 | | chunkSize: *mut usize, [INFO] [stdout] 339 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:345:25 [INFO] [stdout] | [INFO] [stdout] 345 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:352:17 [INFO] [stdout] | [INFO] [stdout] 352 | *chunkSize = chunk_size; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:355:18 [INFO] [stdout] | [INFO] [stdout] 355 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:360:14 [INFO] [stdout] | [INFO] [stdout] 360 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:384:19 [INFO] [stdout] | [INFO] [stdout] 384 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:374:1 [INFO] [stdout] | [INFO] [stdout] 374 | / pub unsafe extern "C" fn zarrsArrayGetChunkOrigin( [INFO] [stdout] 375 | | array: ZarrsArray, [INFO] [stdout] 376 | | dimensionality: usize, [INFO] [stdout] 377 | | pChunkIndices: *const u64, [INFO] [stdout] 378 | | pChunkOrigin: *mut u64, [INFO] [stdout] 379 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:385:25 [INFO] [stdout] | [INFO] [stdout] 385 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:397:14 [INFO] [stdout] | [INFO] [stdout] 397 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:421:19 [INFO] [stdout] | [INFO] [stdout] 421 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn zarrsArrayGetChunkShape( [INFO] [stdout] 412 | | array: ZarrsArray, [INFO] [stdout] 413 | | dimensionality: usize, [INFO] [stdout] 414 | | pChunkIndices: *const u64, [INFO] [stdout] 415 | | pChunkShape: *mut u64, [INFO] [stdout] 416 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:422:25 [INFO] [stdout] | [INFO] [stdout] 422 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:434:14 [INFO] [stdout] | [INFO] [stdout] 434 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:458:19 [INFO] [stdout] | [INFO] [stdout] 458 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn zarrsArrayGetSubsetSize( [INFO] [stdout] 449 | | array: ZarrsArray, [INFO] [stdout] 450 | | dimensionality: usize, [INFO] [stdout] 451 | | pSubsetShape: *const u64, [INFO] [stdout] 452 | | subsetSize: *mut usize, [INFO] [stdout] 453 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:459:24 [INFO] [stdout] | [INFO] [stdout] 459 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:464:10 [INFO] [stdout] | [INFO] [stdout] 464 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | *subsetSize = usize::try_from(subset_shape.iter().product::()).unwrap() * data_type_size; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:489:19 [INFO] [stdout] | [INFO] [stdout] 489 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn zarrsArrayGetMetadataString( [INFO] [stdout] 481 | | array: ZarrsArray, [INFO] [stdout] 482 | | pretty: bool, [INFO] [stdout] 483 | | pMetadataString: *mut *mut c_char, [INFO] [stdout] 484 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:499:13 [INFO] [stdout] | [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:504:6 [INFO] [stdout] | [INFO] [stdout] 504 | *LAST_ERROR = "error converting metadata to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:524:19 [INFO] [stdout] | [INFO] [stdout] 524 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:515:1 [INFO] [stdout] | [INFO] [stdout] 515 | / pub unsafe extern "C" fn zarrsArrayGetAttributesString( [INFO] [stdout] 516 | | array: ZarrsArray, [INFO] [stdout] 517 | | pretty: bool, [INFO] [stdout] 518 | | pAttributesString: *mut *mut c_char, [INFO] [stdout] 519 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:534:13 [INFO] [stdout] | [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:539:6 [INFO] [stdout] | [INFO] [stdout] 539 | *LAST_ERROR = "error converting attributes to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:559:23 [INFO] [stdout] | [INFO] [stdout] 559 | let array = &mut **array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / pub unsafe extern "C" fn zarrsArraySetAttributes( [INFO] [stdout] 552 | | array: ZarrsArray, [INFO] [stdout] 553 | | attributes: FfiStr, [INFO] [stdout] 554 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:565:10 [INFO] [stdout] | [INFO] [stdout] 565 | *LAST_ERROR = "error interpreting attributes to a json map".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | *pStorage = Box::into_raw(Box::new(ZarrsStorage_T(ZarrsStorageEnum::RW(Arc::new( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/storage.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | / pub unsafe extern "C" fn zarrsCreateStorageFilesystem( [INFO] [stdout] 38 | | path: FfiStr, [INFO] [stdout] 39 | | pStorage: *mut ZarrsStorage, [INFO] [stdout] 40 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:50:14 [INFO] [stdout] | [INFO] [stdout] 50 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array.rs:498:12 [INFO] [stdout] | [INFO] [stdout] 498 | if let Ok(cstring) = CString::new(metadata_str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^-------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array.rs:501:9 [INFO] [stdout] | [INFO] [stdout] 501 | } [INFO] [stdout] | ^ [INFO] [stdout] = note: `--force-warn if-let-rescope` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 498 ~ match CString::new(metadata_str) { Ok(cstring) => { [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] 500 | return ZarrsResult::ZARRS_SUCCESS; [INFO] [stdout] 501 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array.rs:533:12 [INFO] [stdout] | [INFO] [stdout] 533 | if let Ok(cstring) = CString::new(attributes_str) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^---------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array.rs:536:9 [INFO] [stdout] | [INFO] [stdout] 536 | } [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 533 ~ match CString::new(attributes_str) { Ok(cstring) => { [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] 535 | return ZarrsResult::ZARRS_SUCCESS; [INFO] [stdout] 536 ~ } _ => {}} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array/array_read_write.rs:12:8 [INFO] [stdout] | [INFO] [stdout] 12 | if let Err(err) = array.store_array_subset(array_subset, subset_bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^---------------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array/array_read_write.rs:15:5 [INFO] [stdout] | [INFO] [stdout] 15 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 12 ~ match array.store_array_subset(array_subset, subset_bytes) { Err(err) => { [INFO] [stdout] 13 | unsafe { *LAST_ERROR = err.to_string() }; [INFO] [stdout] 14 | ZarrsResult::ZARRS_ERROR_ARRAY [INFO] [stdout] 15 ~ } _ => { [INFO] [stdout] 16 | ZarrsResult::ZARRS_SUCCESS [INFO] [stdout] 17 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `if let` assigns a shorter lifetime since Edition 2024 [INFO] [stdout] --> src/array/array_write.rs:51:8 [INFO] [stdout] | [INFO] [stdout] 51 | if let Err(err) = array.store_chunk(chunk_indices, chunk_bytes) { [INFO] [stdout] | ^^^^^^^^^^^^^^^--------------------------------------------- [INFO] [stdout] | | [INFO] [stdout] | this value has a significant drop implementation which may observe a major change in drop order and requires your discretion [INFO] [stdout] | [INFO] [stdout] = warning: this changes meaning in Rust 2024 [INFO] [stdout] = note: for more information, see issue #124085 [INFO] [stdout] help: the value is now dropped here in Edition 2024 [INFO] [stdout] --> src/array/array_write.rs:54:5 [INFO] [stdout] | [INFO] [stdout] 54 | } else { [INFO] [stdout] | ^ [INFO] [stdout] help: a `match` with a single arm can preserve the drop order up to Edition 2021 [INFO] [stdout] | [INFO] [stdout] 51 ~ match array.store_chunk(chunk_indices, chunk_bytes) { Err(err) => { [INFO] [stdout] 52 | unsafe { *LAST_ERROR = err.to_string() }; [INFO] [stdout] 53 | ZarrsResult::ZARRS_ERROR_ARRAY [INFO] [stdout] 54 ~ } _ => { [INFO] [stdout] 55 | ZarrsResult::ZARRS_SUCCESS [INFO] [stdout] 56 ~ }} [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 125 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Fixed tests/array.rs (2 fixes) [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 21.34s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Compiling zarrs_ffi v0.8.3 (/tmp/fixit) [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:128:3 [INFO] [stdout] | [INFO] [stdout] 128 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 128 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read_write.rs:31:3 [INFO] [stdout] | [INFO] [stdout] 31 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 31 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:34:3 [INFO] [stdout] | [INFO] [stdout] 34 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 34 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:67:3 [INFO] [stdout] | [INFO] [stdout] 67 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 67 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:146:3 [INFO] [stdout] | [INFO] [stdout] 146 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 146 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:301:3 [INFO] [stdout] | [INFO] [stdout] 301 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 301 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:29:3 [INFO] [stdout] | [INFO] [stdout] 29 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 29 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:70:3 [INFO] [stdout] | [INFO] [stdout] 70 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 70 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:81:3 [INFO] [stdout] | [INFO] [stdout] 81 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 81 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:118:3 [INFO] [stdout] | [INFO] [stdout] 118 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 118 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:181:3 [INFO] [stdout] | [INFO] [stdout] 181 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 181 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:225:3 [INFO] [stdout] | [INFO] [stdout] 225 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 225 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:296:3 [INFO] [stdout] | [INFO] [stdout] 296 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 296 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:333:3 [INFO] [stdout] | [INFO] [stdout] 333 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 333 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:373:3 [INFO] [stdout] | [INFO] [stdout] 373 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 373 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:514:3 [INFO] [stdout] | [INFO] [stdout] 514 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 514 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:36:3 [INFO] [stdout] | [INFO] [stdout] 36 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 36 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:63:3 [INFO] [stdout] | [INFO] [stdout] 63 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 63 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:50:3 [INFO] [stdout] | [INFO] [stdout] 50 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 50 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:2:3 [INFO] [stdout] | [INFO] [stdout] 2 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:8:3 [INFO] [stdout] | [INFO] [stdout] 8 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 8 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read.rs:128:3 [INFO] [stdout] | [INFO] [stdout] 128 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 128 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:14:3 [INFO] [stdout] | [INFO] [stdout] 14 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 14 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:44:3 [INFO] [stdout] | [INFO] [stdout] 44 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 44 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_read_write.rs:31:3 [INFO] [stdout] | [INFO] [stdout] 31 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 31 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:34:3 [INFO] [stdout] | [INFO] [stdout] 34 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 34 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:67:3 [INFO] [stdout] | [INFO] [stdout] 67 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 67 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:103:3 [INFO] [stdout] | [INFO] [stdout] 103 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 103 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:146:3 [INFO] [stdout] | [INFO] [stdout] 146 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 146 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_sharded.rs:301:3 [INFO] [stdout] | [INFO] [stdout] 301 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 301 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:29:3 [INFO] [stdout] | [INFO] [stdout] 29 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 29 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array/array_write.rs:70:3 [INFO] [stdout] | [INFO] [stdout] 70 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 70 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:81:3 [INFO] [stdout] | [INFO] [stdout] 81 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 81 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:118:3 [INFO] [stdout] | [INFO] [stdout] 118 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 118 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:164:3 [INFO] [stdout] | [INFO] [stdout] 164 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 164 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:181:3 [INFO] [stdout] | [INFO] [stdout] 181 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 181 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:202:3 [INFO] [stdout] | [INFO] [stdout] 202 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 202 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:225:3 [INFO] [stdout] | [INFO] [stdout] 225 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 225 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:266:3 [INFO] [stdout] | [INFO] [stdout] 266 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 266 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:296:3 [INFO] [stdout] | [INFO] [stdout] 296 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 296 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:333:3 [INFO] [stdout] | [INFO] [stdout] 333 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 333 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:373:3 [INFO] [stdout] | [INFO] [stdout] 373 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 373 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:410:3 [INFO] [stdout] | [INFO] [stdout] 410 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 410 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:447:3 [INFO] [stdout] | [INFO] [stdout] 447 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 447 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:479:3 [INFO] [stdout] | [INFO] [stdout] 479 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 479 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:514:3 [INFO] [stdout] | [INFO] [stdout] 514 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 514 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/array.rs:550:3 [INFO] [stdout] | [INFO] [stdout] 550 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 550 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:36:3 [INFO] [stdout] | [INFO] [stdout] 36 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 36 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/storage.rs:63:3 [INFO] [stdout] | [INFO] [stdout] 63 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 63 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:2:3 [INFO] [stdout] | [INFO] [stdout] 2 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 2 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:8:3 [INFO] [stdout] | [INFO] [stdout] 8 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 8 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:14:3 [INFO] [stdout] | [INFO] [stdout] 14 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 14 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/version.rs:22:3 [INFO] [stdout] | [INFO] [stdout] 22 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 22 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:44:3 [INFO] [stdout] | [INFO] [stdout] 44 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 44 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: unsafe attribute used without unsafe [INFO] [stdout] --> src/lib.rs:54:3 [INFO] [stdout] | [INFO] [stdout] 54 | #[no_mangle] [INFO] [stdout] | ^^^^^^^^^ usage of unsafe attribute [INFO] [stdout] | [INFO] [stdout] help: wrap the attribute in `unsafe(...)` [INFO] [stdout] | [INFO] [stdout] 54 | #[unsafe(no_mangle)] [INFO] [stdout] | +++++++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:61:19 [INFO] [stdout] | [INFO] [stdout] 61 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | / pub unsafe extern "C" fn zarrsArrayRetrieveChunk( [INFO] [stdout] 52 | | array: ZarrsArray, [INFO] [stdout] 53 | | dimensionality: usize, [INFO] [stdout] 54 | | pChunkIndices: *const u64, [INFO] [stdout] 55 | | chunkBytesCount: usize, [INFO] [stdout] 56 | | pChunkBytes: *mut u8, [INFO] [stdout] 57 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:62:25 [INFO] [stdout] | [INFO] [stdout] 62 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:79:14 [INFO] [stdout] | [INFO] [stdout] 79 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:141:19 [INFO] [stdout] | [INFO] [stdout] 141 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:129:1 [INFO] [stdout] | [INFO] [stdout] 129 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubset( [INFO] [stdout] 130 | | array: ZarrsArray, [INFO] [stdout] 131 | | dimensionality: usize, [INFO] [stdout] 132 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 135 | | pSubsetBytes: *mut u8, [INFO] [stdout] 136 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:142:24 [INFO] [stdout] | [INFO] [stdout] 142 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:143:24 [INFO] [stdout] | [INFO] [stdout] 143 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:145:9 [INFO] [stdout] | [INFO] [stdout] 145 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:162:14 [INFO] [stdout] | [INFO] [stdout] 162 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read_write.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | / pub unsafe extern "C" fn zarrsArrayStoreSubset( [INFO] [stdout] 33 | | array: ZarrsArray, [INFO] [stdout] 34 | | dimensionality: usize, [INFO] [stdout] 35 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 38 | | pSubsetBytes: *const u8, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:45:24 [INFO] [stdout] | [INFO] [stdout] 45 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:46:24 [INFO] [stdout] | [INFO] [stdout] 46 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:47:24 [INFO] [stdout] | [INFO] [stdout] 47 | let subset_bytes = std::slice::from_raw_parts(pSubsetBytes, subsetBytesCount); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:49:9 [INFO] [stdout] | [INFO] [stdout] 49 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:56:14 [INFO] [stdout] | [INFO] [stdout] 56 | *LAST_ERROR = "storage does not have read/write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkGridShape( [INFO] [stdout] 36 | | array: ZarrsArray, [INFO] [stdout] 37 | | dimensionality: usize, [INFO] [stdout] 38 | | pInnerChunkGridShape: *mut u64, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:78:19 [INFO] [stdout] | [INFO] [stdout] 78 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkShape( [INFO] [stdout] 69 | | array: ZarrsArray, [INFO] [stdout] 70 | | dimensionality: usize, [INFO] [stdout] 71 | | pIsSharded: *mut bool, [INFO] [stdout] 72 | | pInnerChunkShape: *mut u64, [INFO] [stdout] 73 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:87:13 [INFO] [stdout] | [INFO] [stdout] 87 | *pIsSharded = true; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | *pIsSharded = false; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:61:19 [INFO] [stdout] | [INFO] [stdout] 61 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:51:1 [INFO] [stdout] | [INFO] [stdout] 51 | / pub unsafe extern "C" fn zarrsArrayRetrieveChunk( [INFO] [stdout] 52 | | array: ZarrsArray, [INFO] [stdout] 53 | | dimensionality: usize, [INFO] [stdout] 54 | | pChunkIndices: *const u64, [INFO] [stdout] 55 | | chunkBytesCount: usize, [INFO] [stdout] 56 | | pChunkBytes: *mut u8, [INFO] [stdout] 57 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:112:19 [INFO] [stdout] | [INFO] [stdout] 112 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn zarrsCreateShardIndexCache( [INFO] [stdout] 105 | | array: ZarrsArray, [INFO] [stdout] 106 | | pShardIndexCache: *mut ZarrsShardIndexCache, [INFO] [stdout] 107 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:126:13 [INFO] [stdout] | [INFO] [stdout] 126 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:131:14 [INFO] [stdout] | [INFO] [stdout] 131 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:214:19 [INFO] [stdout] | [INFO] [stdout] 214 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayRetrieveInnerChunk( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 206 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 209 | | pChunkBytes: *mut u8, [INFO] [stdout] 210 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:215:19 [INFO] [stdout] | [INFO] [stdout] 215 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:216:25 [INFO] [stdout] | [INFO] [stdout] 216 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:249:14 [INFO] [stdout] | [INFO] [stdout] 249 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:315:19 [INFO] [stdout] | [INFO] [stdout] 315 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:302:1 [INFO] [stdout] | [INFO] [stdout] 302 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubsetSharded( [INFO] [stdout] 303 | | array: ZarrsArray, [INFO] [stdout] 304 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 305 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 309 | | pSubsetBytes: *mut u8, [INFO] [stdout] 310 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:316:19 [INFO] [stdout] | [INFO] [stdout] 316 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:317:24 [INFO] [stdout] | [INFO] [stdout] 317 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:318:24 [INFO] [stdout] | [INFO] [stdout] 318 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:320:9 [INFO] [stdout] | [INFO] [stdout] 320 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:353:14 [INFO] [stdout] | [INFO] [stdout] 353 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:34:19 [INFO] [stdout] | [INFO] [stdout] 34 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe extern "C" fn zarrsArrayStoreMetadata(array: ZarrsArray) -> ZarrsResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:62:25 [INFO] [stdout] | [INFO] [stdout] 62 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:79:14 [INFO] [stdout] | [INFO] [stdout] 79 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:82:19 [INFO] [stdout] | [INFO] [stdout] 82 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | / pub unsafe extern "C" fn zarrsArrayStoreChunk( [INFO] [stdout] 72 | | array: ZarrsArray, [INFO] [stdout] 73 | | dimensionality: usize, [INFO] [stdout] 74 | | pChunkIndices: *const u64, [INFO] [stdout] 75 | | chunkBytesCount: usize, [INFO] [stdout] 76 | | pChunkBytes: *const u8, [INFO] [stdout] 77 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:83:25 [INFO] [stdout] | [INFO] [stdout] 83 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:84:23 [INFO] [stdout] | [INFO] [stdout] 84 | let chunk_bytes = std::slice::from_raw_parts(pChunkBytes, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:92:10 [INFO] [stdout] | [INFO] [stdout] 92 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | *LAST_ERROR = [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:141:19 [INFO] [stdout] | [INFO] [stdout] 141 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read.rs:129:1 [INFO] [stdout] | [INFO] [stdout] 129 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubset( [INFO] [stdout] 130 | | array: ZarrsArray, [INFO] [stdout] 131 | | dimensionality: usize, [INFO] [stdout] 132 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 135 | | pSubsetBytes: *mut u8, [INFO] [stdout] 136 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:142:24 [INFO] [stdout] | [INFO] [stdout] 142 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:143:24 [INFO] [stdout] | [INFO] [stdout] 143 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:145:9 [INFO] [stdout] | [INFO] [stdout] 145 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read.rs:162:14 [INFO] [stdout] | [INFO] [stdout] 162 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:88:10 [INFO] [stdout] | [INFO] [stdout] 88 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / pub unsafe extern "C" fn zarrsOpenArrayRW( [INFO] [stdout] 83 | | storage: ZarrsStorage, [INFO] [stdout] 84 | | path: FfiStr, [INFO] [stdout] 85 | | pArray: *mut ZarrsArray, [INFO] [stdout] 86 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:92:21 [INFO] [stdout] | [INFO] [stdout] 92 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:97:17 [INFO] [stdout] | [INFO] [stdout] 97 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:101:18 [INFO] [stdout] | [INFO] [stdout] 101 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:106:10 [INFO] [stdout] | [INFO] [stdout] 106 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_read_write.rs:32:1 [INFO] [stdout] | [INFO] [stdout] 32 | / pub unsafe extern "C" fn zarrsArrayStoreSubset( [INFO] [stdout] 33 | | array: ZarrsArray, [INFO] [stdout] 34 | | dimensionality: usize, [INFO] [stdout] 35 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 38 | | pSubsetBytes: *const u8, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:45:24 [INFO] [stdout] | [INFO] [stdout] 45 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:46:24 [INFO] [stdout] | [INFO] [stdout] 46 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:47:24 [INFO] [stdout] | [INFO] [stdout] 47 | let subset_bytes = std::slice::from_raw_parts(pSubsetBytes, subsetBytesCount); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:49:9 [INFO] [stdout] | [INFO] [stdout] 49 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_read_write.rs:56:14 [INFO] [stdout] | [INFO] [stdout] 56 | *LAST_ERROR = "storage does not have read/write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:44:19 [INFO] [stdout] | [INFO] [stdout] 44 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:35:1 [INFO] [stdout] | [INFO] [stdout] 35 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkGridShape( [INFO] [stdout] 36 | | array: ZarrsArray, [INFO] [stdout] 37 | | dimensionality: usize, [INFO] [stdout] 38 | | pInnerChunkGridShape: *mut u64, [INFO] [stdout] 39 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:126:10 [INFO] [stdout] | [INFO] [stdout] 126 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | / pub unsafe extern "C" fn zarrsCreateArrayRW( [INFO] [stdout] 120 | | storage: ZarrsStorage, [INFO] [stdout] 121 | | path: FfiStr, [INFO] [stdout] 122 | | metadata: FfiStr, [INFO] [stdout] 123 | | pArray: *mut ZarrsArray, [INFO] [stdout] 124 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:130:21 [INFO] [stdout] | [INFO] [stdout] 130 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:135:14 [INFO] [stdout] | [INFO] [stdout] 135 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:143:17 [INFO] [stdout] | [INFO] [stdout] 143 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:147:18 [INFO] [stdout] | [INFO] [stdout] 147 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:78:19 [INFO] [stdout] | [INFO] [stdout] 78 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:68:1 [INFO] [stdout] | [INFO] [stdout] 68 | / pub unsafe extern "C" fn zarrsArrayGetInnerChunkShape( [INFO] [stdout] 69 | | array: ZarrsArray, [INFO] [stdout] 70 | | dimensionality: usize, [INFO] [stdout] 71 | | pIsSharded: *mut bool, [INFO] [stdout] 72 | | pInnerChunkShape: *mut u64, [INFO] [stdout] 73 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:152:10 [INFO] [stdout] | [INFO] [stdout] 152 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:87:13 [INFO] [stdout] | [INFO] [stdout] 87 | *pIsSharded = true; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:90:13 [INFO] [stdout] | [INFO] [stdout] 90 | *pIsSharded = false; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:189:19 [INFO] [stdout] | [INFO] [stdout] 189 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:182:1 [INFO] [stdout] | [INFO] [stdout] 182 | / pub unsafe extern "C" fn zarrsArrayGetDimensionality( [INFO] [stdout] 183 | | array: ZarrsArray, [INFO] [stdout] 184 | | dimensionality: *mut usize, [INFO] [stdout] 185 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | *dimensionality = array_fn!(array, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:211:19 [INFO] [stdout] | [INFO] [stdout] 211 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayGetShape( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | dimensionality: usize, [INFO] [stdout] 206 | | pShape: *mut u64, [INFO] [stdout] 207 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:112:19 [INFO] [stdout] | [INFO] [stdout] 112 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | / pub unsafe extern "C" fn zarrsCreateShardIndexCache( [INFO] [stdout] 105 | | array: ZarrsArray, [INFO] [stdout] 106 | | pShardIndexCache: *mut ZarrsShardIndexCache, [INFO] [stdout] 107 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:121:13 [INFO] [stdout] | [INFO] [stdout] 121 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:126:13 [INFO] [stdout] | [INFO] [stdout] 126 | *pShardIndexCache = Box::into_raw(Box::new(ZarrsShardIndexCache_T( [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:233:19 [INFO] [stdout] | [INFO] [stdout] 233 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:226:1 [INFO] [stdout] | [INFO] [stdout] 226 | / pub unsafe extern "C" fn zarrsArrayGetDataType( [INFO] [stdout] 227 | | array: ZarrsArray, [INFO] [stdout] 228 | | pDataType: *mut ZarrsDataType, [INFO] [stdout] 229 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:131:14 [INFO] [stdout] | [INFO] [stdout] 131 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | *pDataType = match data_type { [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:275:19 [INFO] [stdout] | [INFO] [stdout] 275 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | / pub unsafe extern "C" fn zarrsArrayGetChunkGridShape( [INFO] [stdout] 268 | | array: ZarrsArray, [INFO] [stdout] 269 | | dimensionality: usize, [INFO] [stdout] 270 | | pChunkGridShape: *mut u64, [INFO] [stdout] 271 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:308:19 [INFO] [stdout] | [INFO] [stdout] 308 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:297:1 [INFO] [stdout] | [INFO] [stdout] 297 | / pub unsafe extern "C" fn zarrsArrayGetChunksInSubset( [INFO] [stdout] 298 | | array: ZarrsArray, [INFO] [stdout] 299 | | dimensionality: usize, [INFO] [stdout] 300 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 303 | | pChunksShape: *mut u64, [INFO] [stdout] 304 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:214:19 [INFO] [stdout] | [INFO] [stdout] 214 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayRetrieveInnerChunk( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 206 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 209 | | pChunkBytes: *mut u8, [INFO] [stdout] 210 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:215:19 [INFO] [stdout] | [INFO] [stdout] 215 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:216:25 [INFO] [stdout] | [INFO] [stdout] 216 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:249:14 [INFO] [stdout] | [INFO] [stdout] 249 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:344:19 [INFO] [stdout] | [INFO] [stdout] 344 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:334:1 [INFO] [stdout] | [INFO] [stdout] 334 | / pub unsafe extern "C" fn zarrsArrayGetChunkSize( [INFO] [stdout] 335 | | array: ZarrsArray, [INFO] [stdout] 336 | | dimensionality: usize, [INFO] [stdout] 337 | | pChunkIndices: *const u64, [INFO] [stdout] 338 | | chunkSize: *mut usize, [INFO] [stdout] 339 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:345:25 [INFO] [stdout] | [INFO] [stdout] 345 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:352:17 [INFO] [stdout] | [INFO] [stdout] 352 | *chunkSize = chunk_size; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:355:18 [INFO] [stdout] | [INFO] [stdout] 355 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:360:14 [INFO] [stdout] | [INFO] [stdout] 360 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:315:19 [INFO] [stdout] | [INFO] [stdout] 315 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_sharded.rs:302:1 [INFO] [stdout] | [INFO] [stdout] 302 | / pub unsafe extern "C" fn zarrsArrayRetrieveSubsetSharded( [INFO] [stdout] 303 | | array: ZarrsArray, [INFO] [stdout] 304 | | cache: ZarrsShardIndexCache, [INFO] [stdout] 305 | | dimensionality: usize, [INFO] [stdout] ... | [INFO] [stdout] 309 | | pSubsetBytes: *mut u8, [INFO] [stdout] 310 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:384:19 [INFO] [stdout] | [INFO] [stdout] 384 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:374:1 [INFO] [stdout] | [INFO] [stdout] 374 | / pub unsafe extern "C" fn zarrsArrayGetChunkOrigin( [INFO] [stdout] 375 | | array: ZarrsArray, [INFO] [stdout] 376 | | dimensionality: usize, [INFO] [stdout] 377 | | pChunkIndices: *const u64, [INFO] [stdout] 378 | | pChunkOrigin: *mut u64, [INFO] [stdout] 379 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:316:19 [INFO] [stdout] | [INFO] [stdout] 316 | let cache = &**cache; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:385:25 [INFO] [stdout] | [INFO] [stdout] 385 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:317:24 [INFO] [stdout] | [INFO] [stdout] 317 | let subset_start = std::slice::from_raw_parts(pSubsetStart, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:397:14 [INFO] [stdout] | [INFO] [stdout] 397 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:318:24 [INFO] [stdout] | [INFO] [stdout] 318 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `zarrs::array_subset::ArraySubset::new_with_start_shape_unchecked` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:320:9 [INFO] [stdout] | [INFO] [stdout] 320 | ArraySubset::new_with_start_shape_unchecked(subset_start.to_vec(), subset_shape.to_vec()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_sharded.rs:353:14 [INFO] [stdout] | [INFO] [stdout] 353 | *LAST_ERROR = "storage does not have read capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:421:19 [INFO] [stdout] | [INFO] [stdout] 421 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn zarrsArrayGetChunkShape( [INFO] [stdout] 412 | | array: ZarrsArray, [INFO] [stdout] 413 | | dimensionality: usize, [INFO] [stdout] 414 | | pChunkIndices: *const u64, [INFO] [stdout] 415 | | pChunkShape: *mut u64, [INFO] [stdout] 416 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:422:25 [INFO] [stdout] | [INFO] [stdout] 422 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:434:14 [INFO] [stdout] | [INFO] [stdout] 434 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:34:19 [INFO] [stdout] | [INFO] [stdout] 34 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:30:1 [INFO] [stdout] | [INFO] [stdout] 30 | pub unsafe extern "C" fn zarrsArrayStoreMetadata(array: ZarrsArray) -> ZarrsResult { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:40:14 [INFO] [stdout] | [INFO] [stdout] 40 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:458:19 [INFO] [stdout] | [INFO] [stdout] 458 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn zarrsArrayGetSubsetSize( [INFO] [stdout] 449 | | array: ZarrsArray, [INFO] [stdout] 450 | | dimensionality: usize, [INFO] [stdout] 451 | | pSubsetShape: *const u64, [INFO] [stdout] 452 | | subsetSize: *mut usize, [INFO] [stdout] 453 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:459:24 [INFO] [stdout] | [INFO] [stdout] 459 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:464:10 [INFO] [stdout] | [INFO] [stdout] 464 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | *subsetSize = usize::try_from(subset_shape.iter().product::()).unwrap() * data_type_size; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:82:19 [INFO] [stdout] | [INFO] [stdout] 82 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array/array_write.rs:71:1 [INFO] [stdout] | [INFO] [stdout] 71 | / pub unsafe extern "C" fn zarrsArrayStoreChunk( [INFO] [stdout] 72 | | array: ZarrsArray, [INFO] [stdout] 73 | | dimensionality: usize, [INFO] [stdout] 74 | | pChunkIndices: *const u64, [INFO] [stdout] 75 | | chunkBytesCount: usize, [INFO] [stdout] 76 | | pChunkBytes: *const u8, [INFO] [stdout] 77 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:83:25 [INFO] [stdout] | [INFO] [stdout] 83 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:489:19 [INFO] [stdout] | [INFO] [stdout] 489 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn zarrsArrayGetMetadataString( [INFO] [stdout] 481 | | array: ZarrsArray, [INFO] [stdout] 482 | | pretty: bool, [INFO] [stdout] 483 | | pMetadataString: *mut *mut c_char, [INFO] [stdout] 484 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:84:23 [INFO] [stdout] | [INFO] [stdout] 84 | let chunk_bytes = std::slice::from_raw_parts(pChunkBytes, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:499:13 [INFO] [stdout] | [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:504:6 [INFO] [stdout] | [INFO] [stdout] 504 | *LAST_ERROR = "error converting metadata to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:92:10 [INFO] [stdout] | [INFO] [stdout] 92 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:96:10 [INFO] [stdout] | [INFO] [stdout] 96 | *LAST_ERROR = [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array/array_write.rs:107:14 [INFO] [stdout] | [INFO] [stdout] 107 | *LAST_ERROR = "storage does not have write capability".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:524:19 [INFO] [stdout] | [INFO] [stdout] 524 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:515:1 [INFO] [stdout] | [INFO] [stdout] 515 | / pub unsafe extern "C" fn zarrsArrayGetAttributesString( [INFO] [stdout] 516 | | array: ZarrsArray, [INFO] [stdout] 517 | | pretty: bool, [INFO] [stdout] 518 | | pAttributesString: *mut *mut c_char, [INFO] [stdout] 519 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:88:10 [INFO] [stdout] | [INFO] [stdout] 88 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:82:1 [INFO] [stdout] | [INFO] [stdout] 82 | / pub unsafe extern "C" fn zarrsOpenArrayRW( [INFO] [stdout] 83 | | storage: ZarrsStorage, [INFO] [stdout] 84 | | path: FfiStr, [INFO] [stdout] 85 | | pArray: *mut ZarrsArray, [INFO] [stdout] 86 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:534:13 [INFO] [stdout] | [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:539:6 [INFO] [stdout] | [INFO] [stdout] 539 | *LAST_ERROR = "error converting attributes to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:92:21 [INFO] [stdout] | [INFO] [stdout] 92 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:97:17 [INFO] [stdout] | [INFO] [stdout] 97 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:101:18 [INFO] [stdout] | [INFO] [stdout] 101 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:106:10 [INFO] [stdout] | [INFO] [stdout] 106 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:559:23 [INFO] [stdout] | [INFO] [stdout] 559 | let array = &mut **array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / pub unsafe extern "C" fn zarrsArraySetAttributes( [INFO] [stdout] 552 | | array: ZarrsArray, [INFO] [stdout] 553 | | attributes: FfiStr, [INFO] [stdout] 554 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:565:10 [INFO] [stdout] | [INFO] [stdout] 565 | *LAST_ERROR = "error interpreting attributes to a json map".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | *pStorage = Box::into_raw(Box::new(ZarrsStorage_T(ZarrsStorageEnum::RW(Arc::new( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/storage.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | / pub unsafe extern "C" fn zarrsCreateStorageFilesystem( [INFO] [stdout] 38 | | path: FfiStr, [INFO] [stdout] 39 | | pStorage: *mut ZarrsStorage, [INFO] [stdout] 40 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:50:14 [INFO] [stdout] | [INFO] [stdout] 50 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:126:10 [INFO] [stdout] | [INFO] [stdout] 126 | *LAST_ERROR = "storage is null".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:119:1 [INFO] [stdout] | [INFO] [stdout] 119 | / pub unsafe extern "C" fn zarrsCreateArrayRW( [INFO] [stdout] 120 | | storage: ZarrsStorage, [INFO] [stdout] 121 | | path: FfiStr, [INFO] [stdout] 122 | | metadata: FfiStr, [INFO] [stdout] 123 | | pArray: *mut ZarrsArray, [INFO] [stdout] 124 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:130:21 [INFO] [stdout] | [INFO] [stdout] 130 | let storage = &**storage; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:135:14 [INFO] [stdout] | [INFO] [stdout] 135 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:143:17 [INFO] [stdout] | [INFO] [stdout] 143 | *pArray = Box::into_raw(Box::new(ZarrsArray_T(ZarrsArrayEnum::RW(array)))); [INFO] [stdout] | ^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:147:18 [INFO] [stdout] | [INFO] [stdout] 147 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:152:10 [INFO] [stdout] | [INFO] [stdout] 152 | *LAST_ERROR = "storage does not support read and write".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:189:19 [INFO] [stdout] | [INFO] [stdout] 189 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:182:1 [INFO] [stdout] | [INFO] [stdout] 182 | / pub unsafe extern "C" fn zarrsArrayGetDimensionality( [INFO] [stdout] 183 | | array: ZarrsArray, [INFO] [stdout] 184 | | dimensionality: *mut usize, [INFO] [stdout] 185 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:190:5 [INFO] [stdout] | [INFO] [stdout] 190 | *dimensionality = array_fn!(array, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:211:19 [INFO] [stdout] | [INFO] [stdout] 211 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:203:1 [INFO] [stdout] | [INFO] [stdout] 203 | / pub unsafe extern "C" fn zarrsArrayGetShape( [INFO] [stdout] 204 | | array: ZarrsArray, [INFO] [stdout] 205 | | dimensionality: usize, [INFO] [stdout] 206 | | pShape: *mut u64, [INFO] [stdout] 207 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:233:19 [INFO] [stdout] | [INFO] [stdout] 233 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:226:1 [INFO] [stdout] | [INFO] [stdout] 226 | / pub unsafe extern "C" fn zarrsArrayGetDataType( [INFO] [stdout] 227 | | array: ZarrsArray, [INFO] [stdout] 228 | | pDataType: *mut ZarrsDataType, [INFO] [stdout] 229 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:235:5 [INFO] [stdout] | [INFO] [stdout] 235 | *pDataType = match data_type { [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:275:19 [INFO] [stdout] | [INFO] [stdout] 275 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:267:1 [INFO] [stdout] | [INFO] [stdout] 267 | / pub unsafe extern "C" fn zarrsArrayGetChunkGridShape( [INFO] [stdout] 268 | | array: ZarrsArray, [INFO] [stdout] 269 | | dimensionality: usize, [INFO] [stdout] 270 | | pChunkGridShape: *mut u64, [INFO] [stdout] 271 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:308:19 [INFO] [stdout] | [INFO] [stdout] 308 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:297:1 [INFO] [stdout] | [INFO] [stdout] 297 | / pub unsafe extern "C" fn zarrsArrayGetChunksInSubset( [INFO] [stdout] 298 | | array: ZarrsArray, [INFO] [stdout] 299 | | dimensionality: usize, [INFO] [stdout] 300 | | pSubsetStart: *const u64, [INFO] [stdout] ... | [INFO] [stdout] 303 | | pChunksShape: *mut u64, [INFO] [stdout] 304 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 34 previous errors; 84 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:344:19 [INFO] [stdout] | [INFO] [stdout] 344 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:334:1 [INFO] [stdout] | [INFO] [stdout] 334 | / pub unsafe extern "C" fn zarrsArrayGetChunkSize( [INFO] [stdout] 335 | | array: ZarrsArray, [INFO] [stdout] 336 | | dimensionality: usize, [INFO] [stdout] 337 | | pChunkIndices: *const u64, [INFO] [stdout] 338 | | chunkSize: *mut usize, [INFO] [stdout] 339 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:345:25 [INFO] [stdout] | [INFO] [stdout] 345 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:352:17 [INFO] [stdout] | [INFO] [stdout] 352 | *chunkSize = chunk_size; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:355:18 [INFO] [stdout] | [INFO] [stdout] 355 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:360:14 [INFO] [stdout] | [INFO] [stdout] 360 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:384:19 [INFO] [stdout] | [INFO] [stdout] 384 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:374:1 [INFO] [stdout] | [INFO] [stdout] 374 | / pub unsafe extern "C" fn zarrsArrayGetChunkOrigin( [INFO] [stdout] 375 | | array: ZarrsArray, [INFO] [stdout] 376 | | dimensionality: usize, [INFO] [stdout] 377 | | pChunkIndices: *const u64, [INFO] [stdout] 378 | | pChunkOrigin: *mut u64, [INFO] [stdout] 379 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:385:25 [INFO] [stdout] | [INFO] [stdout] 385 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:397:14 [INFO] [stdout] | [INFO] [stdout] 397 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:421:19 [INFO] [stdout] | [INFO] [stdout] 421 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:411:1 [INFO] [stdout] | [INFO] [stdout] 411 | / pub unsafe extern "C" fn zarrsArrayGetChunkShape( [INFO] [stdout] 412 | | array: ZarrsArray, [INFO] [stdout] 413 | | dimensionality: usize, [INFO] [stdout] 414 | | pChunkIndices: *const u64, [INFO] [stdout] 415 | | pChunkShape: *mut u64, [INFO] [stdout] 416 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:422:25 [INFO] [stdout] | [INFO] [stdout] 422 | let chunk_indices = std::slice::from_raw_parts(pChunkIndices, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:434:14 [INFO] [stdout] | [INFO] [stdout] 434 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:458:19 [INFO] [stdout] | [INFO] [stdout] 458 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:448:1 [INFO] [stdout] | [INFO] [stdout] 448 | / pub unsafe extern "C" fn zarrsArrayGetSubsetSize( [INFO] [stdout] 449 | | array: ZarrsArray, [INFO] [stdout] 450 | | dimensionality: usize, [INFO] [stdout] 451 | | pSubsetShape: *const u64, [INFO] [stdout] 452 | | subsetSize: *mut usize, [INFO] [stdout] 453 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:459:24 [INFO] [stdout] | [INFO] [stdout] 459 | let subset_shape = std::slice::from_raw_parts(pSubsetShape, dimensionality); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:464:10 [INFO] [stdout] | [INFO] [stdout] 464 | *LAST_ERROR = "variable size data types are not supported".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:469:5 [INFO] [stdout] | [INFO] [stdout] 469 | *subsetSize = usize::try_from(subset_shape.iter().product::()).unwrap() * data_type_size; [INFO] [stdout] | ^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:489:19 [INFO] [stdout] | [INFO] [stdout] 489 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:480:1 [INFO] [stdout] | [INFO] [stdout] 480 | / pub unsafe extern "C" fn zarrsArrayGetMetadataString( [INFO] [stdout] 481 | | array: ZarrsArray, [INFO] [stdout] 482 | | pretty: bool, [INFO] [stdout] 483 | | pMetadataString: *mut *mut c_char, [INFO] [stdout] 484 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:499:13 [INFO] [stdout] | [INFO] [stdout] 499 | *pMetadataString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:504:6 [INFO] [stdout] | [INFO] [stdout] 504 | *LAST_ERROR = "error converting metadata to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:524:19 [INFO] [stdout] | [INFO] [stdout] 524 | let array = &**array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:515:1 [INFO] [stdout] | [INFO] [stdout] 515 | / pub unsafe extern "C" fn zarrsArrayGetAttributesString( [INFO] [stdout] 516 | | array: ZarrsArray, [INFO] [stdout] 517 | | pretty: bool, [INFO] [stdout] 518 | | pAttributesString: *mut *mut c_char, [INFO] [stdout] 519 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:534:13 [INFO] [stdout] | [INFO] [stdout] 534 | *pAttributesString = cstring.into_raw(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:539:6 [INFO] [stdout] | [INFO] [stdout] 539 | *LAST_ERROR = "error converting attributes to a json string".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:559:23 [INFO] [stdout] | [INFO] [stdout] 559 | let array = &mut **array; [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/array.rs:551:1 [INFO] [stdout] | [INFO] [stdout] 551 | / pub unsafe extern "C" fn zarrsArraySetAttributes( [INFO] [stdout] 552 | | array: ZarrsArray, [INFO] [stdout] 553 | | attributes: FfiStr, [INFO] [stdout] 554 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/array.rs:565:10 [INFO] [stdout] | [INFO] [stdout] 565 | *LAST_ERROR = "error interpreting attributes to a json map".to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:44:13 [INFO] [stdout] | [INFO] [stdout] 44 | *pStorage = Box::into_raw(Box::new(ZarrsStorage_T(ZarrsStorageEnum::RW(Arc::new( [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/storage.rs:37:1 [INFO] [stdout] | [INFO] [stdout] 37 | / pub unsafe extern "C" fn zarrsCreateStorageFilesystem( [INFO] [stdout] 38 | | path: FfiStr, [INFO] [stdout] 39 | | pStorage: *mut ZarrsStorage, [INFO] [stdout] 40 | | ) -> ZarrsResult { [INFO] [stdout] | |________________^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: use of mutable static is unsafe and requires unsafe block [INFO] [stdout] --> src/storage.rs:50:14 [INFO] [stdout] | [INFO] [stdout] 50 | *LAST_ERROR = err.to_string(); [INFO] [stdout] | ^^^^^^^^^^ use of mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #71668 [INFO] [stdout] = note: mutable statics can be mutated by multiple threads: aliasing violations or data races will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `zarrs_ffi` (lib) due to 35 previous errors; 84 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error: aborting due to 34 previous errors; 84 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `zarrs_ffi` (lib test) due to 35 previous errors; 84 warnings emitted [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "6b1a0ec435dce54a595f656927af0e8a4aea3e7e2eab915fbadbfd3006797688", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "6b1a0ec435dce54a595f656927af0e8a4aea3e7e2eab915fbadbfd3006797688", kill_on_drop: false }` [INFO] [stdout] 6b1a0ec435dce54a595f656927af0e8a4aea3e7e2eab915fbadbfd3006797688