[INFO] cloning repository https://github.com/pingooio/stdx-rs [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/pingooio/stdx-rs" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] d74795e405a0ad98cc7f7f2cbfb7dae242b94f9e [INFO] checking pingooio/stdx-rs/d74795e405a0ad98cc7f7f2cbfb7dae242b94f9e against master#642c19bfc3a5c1de985bf5d0cc8207ac9d22708a for pr-148577 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs" "/workspace/builds/worker-2-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-2-tc1/source'... [INFO] [stderr] done. [INFO] removed /workspace/builds/worker-2-tc1/source/.cargo/config.toml [INFO] started tweaking git repo https://github.com/pingooio/stdx-rs [INFO] finished tweaking git repo https://github.com/pingooio/stdx-rs [INFO] tweaked toml for git repo https://github.com/pingooio/stdx-rs written to /workspace/builds/worker-2-tc1/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/pingooio/stdx-rs on toolchain 642c19bfc3a5c1de985bf5d0cc8207ac9d22708a [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/pingooio/stdx-rs already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: profiles for the non root package will be ignored, specify profiles at the workspace root: [INFO] [stderr] package: /workspace/builds/worker-2-tc1/source/bel/benchmarks/Cargo.toml [INFO] [stderr] workspace: /workspace/builds/worker-2-tc1/source/Cargo.toml [INFO] [stderr] warning: /workspace/builds/worker-2-tc1/source/bel/Cargo.toml: unused manifest key: dependencies.paste.ref [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Updating crates.io index [INFO] [stderr] Updating git repository `https://github.com/dtolnay/paste` [INFO] [stderr] Updating git repository `https://github.com/RustCrypto/hashes` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded compression-core v0.4.30 [INFO] [stderr] Downloaded crypto-common v0.2.0-rc.5 [INFO] [stderr] Downloaded is-terminal v0.4.17 [INFO] [stderr] Downloaded compression-codecs v0.4.32 [INFO] [stderr] Downloaded murmur3 v0.4.1 [INFO] [stderr] Downloaded block-buffer v0.11.0 [INFO] [stderr] Downloaded keccak v0.2.0-pre.0 [INFO] [stderr] Downloaded async-compression v0.4.33 [INFO] [stderr] Downloaded better_any v0.2.0 [INFO] [stderr] Downloaded hybrid-array v0.4.5 [INFO] [stderr] Downloaded const-oid v0.10.1 [INFO] [stderr] Downloaded digest v0.11.0-rc.4 [INFO] [stderr] Downloaded libfuzzer-sys v0.4.10 [INFO] [stderr] Downloaded antlr4rust v0.3.0-beta3 [INFO] [stderr] Downloaded aws-lc-rs v1.14.1 [INFO] [stderr] Downloaded bindgen v0.72.1 [INFO] [stderr] Downloaded aws-lc-sys v0.32.3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9 [INFO] running `Command { std: "docker" "start" "-a" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }` [INFO] [stdout] 3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662 [INFO] running `Command { std: "docker" "start" "-a" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }` [INFO] [stderr] warning: profiles for the non root package will be ignored, specify profiles at the workspace root: [INFO] [stderr] package: /opt/rustwide/workdir/bel/benchmarks/Cargo.toml [INFO] [stderr] workspace: /opt/rustwide/workdir/Cargo.toml [INFO] [stderr] warning: /opt/rustwide/workdir/bel/Cargo.toml: unused manifest key: dependencies.paste.ref [INFO] [stderr] Compiling quote v1.0.42 [INFO] [stderr] Compiling unicode-ident v1.0.22 [INFO] [stderr] Checking cfg-if v1.0.0 (/opt/rustwide/workdir/cfg-if) [INFO] [stderr] Compiling serde v1.0.228 [INFO] [stderr] Compiling zerocopy v0.8.27 [INFO] [stderr] Compiling ryu v1.0.18 (/opt/rustwide/workdir/ryu) [INFO] [stderr] Compiling parking_lot_core v0.9.12 [INFO] [stderr] Checking itoa v1.0.11 (/opt/rustwide/workdir/itoa) [INFO] [stderr] Checking lock_api v0.4.14 [INFO] [stderr] Checking pin-project-lite v0.2.14 (/opt/rustwide/workdir/pin_project_lite) [INFO] [stderr] Compiling libc v0.2.177 [INFO] [stderr] Checking signal-hook-registry v1.4.6 [INFO] [stderr] Compiling dunce v1.0.5 [INFO] [stderr] Compiling fs_extra v1.3.0 [INFO] [stderr] Checking getrandom v0.2.16 [INFO] [stderr] Compiling num-traits v0.2.19 [INFO] [stderr] Compiling thiserror v2.0.17 [INFO] [stderr] Compiling aws-lc-rs v1.14.1 [INFO] [stderr] Compiling proc-macro2 v1.0.103 [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/udiv128.rs:3:12 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/udiv128.rs:30:12 [INFO] [stdout] | [INFO] [stdout] 30 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:88:16 [INFO] [stdout] | [INFO] [stdout] 88 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:98:16 [INFO] [stdout] | [INFO] [stdout] 98 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:137:24 [INFO] [stdout] | [INFO] [stdout] 137 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] ... [INFO] [stdout] 218 | / impl_Integer!( [INFO] [stdout] 219 | | I8_MAX_LEN => i8, [INFO] [stdout] 220 | | U8_MAX_LEN => u8, [INFO] [stdout] 221 | | I16_MAX_LEN => i16, [INFO] [stdout] ... | [INFO] [stdout] 224 | | U32_MAX_LEN => u32 [INFO] [stdout] 225 | | as u32); [INFO] [stdout] | |___________- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:137:24 [INFO] [stdout] | [INFO] [stdout] 137 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] ... [INFO] [stdout] 227 | impl_Integer!(I64_MAX_LEN => i64, U64_MAX_LEN => u64 as u64); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:137:24 [INFO] [stdout] | [INFO] [stdout] 137 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] ... [INFO] [stdout] 236 | impl_Integer!(I64_MAX_LEN => isize, U64_MAX_LEN => usize as u64); [INFO] [stdout] | ---------------------------------------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> itoa/src/lib.rs:247:24 [INFO] [stdout] | [INFO] [stdout] 247 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] ... [INFO] [stdout] 312 | impl_Integer128!(I128_MAX_LEN => i128, U128_MAX_LEN => u128); [INFO] [stdout] | ------------------------------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: this warning originates in the macro `impl_Integer128` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking percent-encoding v2.3.2 (/opt/rustwide/workdir/percent_encoding) [INFO] [stderr] Checking iana-time-zone v0.1.64 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking http v1.3.1 [INFO] [stderr] Checking nom v7.1.3 [INFO] [stderr] Checking httpdate v1.0.3 (/opt/rustwide/workdir/httpdate) [INFO] [stderr] Checking regex-automata v0.4.13 [INFO] [stderr] Checking form_urlencoded v1.2.2 (/opt/rustwide/workdir/form_urlencoded) [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:29:16 [INFO] [stdout] | [INFO] [stdout] 29 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:48:16 [INFO] [stdout] | [INFO] [stdout] 48 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:49:16 [INFO] [stdout] | [INFO] [stdout] 49 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:74:16 [INFO] [stdout] | [INFO] [stdout] 74 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:97:16 [INFO] [stdout] | [INFO] [stdout] 97 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:127:16 [INFO] [stdout] | [INFO] [stdout] 127 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:156:16 [INFO] [stdout] | [INFO] [stdout] 156 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:51:12 [INFO] [stdout] | [INFO] [stdout] 51 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:63:12 [INFO] [stdout] | [INFO] [stdout] 63 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:73:12 [INFO] [stdout] | [INFO] [stdout] 73 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:80:12 [INFO] [stdout] | [INFO] [stdout] 80 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/common.rs:89:12 [INFO] [stdout] | [INFO] [stdout] 89 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s.rs:38:12 [INFO] [stdout] | [INFO] [stdout] 38 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s.rs:91:12 [INFO] [stdout] | [INFO] [stdout] 91 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:23:12 [INFO] [stdout] | [INFO] [stdout] 23 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:28:12 [INFO] [stdout] | [INFO] [stdout] 28 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:33:12 [INFO] [stdout] | [INFO] [stdout] 33 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:38:12 [INFO] [stdout] | [INFO] [stdout] 38 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:55:12 [INFO] [stdout] | [INFO] [stdout] 55 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:62:12 [INFO] [stdout] | [INFO] [stdout] 62 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:70:12 [INFO] [stdout] | [INFO] [stdout] 70 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/d2s_intrinsics.rs:77:12 [INFO] [stdout] | [INFO] [stdout] 77 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s.rs:39:12 [INFO] [stdout] | [INFO] [stdout] 39 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:26:12 [INFO] [stdout] | [INFO] [stdout] 26 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:43:12 [INFO] [stdout] | [INFO] [stdout] 43 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:49:12 [INFO] [stdout] | [INFO] [stdout] 49 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:57:12 [INFO] [stdout] | [INFO] [stdout] 57 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:74:12 [INFO] [stdout] | [INFO] [stdout] 74 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/f2s_intrinsics.rs:94:12 [INFO] [stdout] | [INFO] [stdout] 94 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/exponent.rs:5:12 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/exponent.rs:33:12 [INFO] [stdout] | [INFO] [stdout] 33 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/mantissa.rs:5:12 [INFO] [stdout] | [INFO] [stdout] 5 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/mantissa.rs:30:12 [INFO] [stdout] | [INFO] [stdout] 30 | #[cfg_attr(feature = "no-panic", inline)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/mod.rs:57:12 [INFO] [stdout] | [INFO] [stdout] 57 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/mod.rs:162:12 [INFO] [stdout] | [INFO] [stdout] 162 | #[cfg_attr(feature = "no-panic", no_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/buffer/mod.rs:3:7 [INFO] [stdout] | [INFO] [stdout] 3 | #[cfg(feature = "no-panic")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic` [INFO] [stdout] --> ryu/src/pretty/mod.rs:6:7 [INFO] [stdout] | [INFO] [stdout] 6 | #[cfg(feature = "no-panic")] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `small` [INFO] [stdout] = help: consider adding `no-panic` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling paste v1.0.15 (https://github.com/dtolnay/paste#6a302522) [INFO] [stdout] warning: value assigned to `vp` is never read [INFO] [stdout] --> ryu/src/f2s.rs:145:17 [INFO] [stdout] | [INFO] [stdout] 145 | vp /= 10; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking bit-vec v0.8.0 [INFO] [stderr] Checking serde_json v1.0.145 [INFO] [stderr] Checking better_any v0.2.0 [INFO] [stderr] Checking murmur3 v0.4.1 [INFO] [stderr] Compiling thiserror v1.0.61 (/opt/rustwide/workdir/thiserror) [INFO] [stderr] Checking num_cpus v1.16.0 (/opt/rustwide/workdir/num_cpus) [INFO] [stderr] Compiling typenum v1.19.0 [INFO] [stderr] Compiling mime_guess v2.0.4 (/opt/rustwide/workdir/mime_guess) [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:1:7 [INFO] [stdout] | [INFO] [stdout] 1 | #[cfg(feature = "phf")] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:20:7 [INFO] [stdout] | [INFO] [stdout] 20 | #[cfg(feature = "phf")] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:38:7 [INFO] [stdout] | [INFO] [stdout] 38 | #[cfg(feature = "phf")] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:72:11 [INFO] [stdout] | [INFO] [stdout] 72 | #[cfg(all(feature = "phf", feature = "rev-mappings"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:120:15 [INFO] [stdout] | [INFO] [stdout] 120 | #[cfg(all(not(feature = "phf"), feature = "rev-mappings"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/build.rs:30:11 [INFO] [stdout] | [INFO] [stdout] 30 | #[cfg(feature = "phf")] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `nacl` [INFO] [stdout] --> num_cpus/src/lib.rs:353:5 [INFO] [stdout] | [INFO] [stdout] 353 | target_os = "nacl", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_os` are: `aix`, `amdhsa`, `android`, `cuda`, `cygwin`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `helenos`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `lynxos178`, `macos`, `managarm`, `motor`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `psx`, `redox`, `rtems`, `solaris`, `solid_asp3`, and `teeos` and 13 more [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking parking_lot v0.12.5 [INFO] [stdout] warning: unexpected `cfg` condition value: `nacl` [INFO] [stdout] --> num_cpus/src/lib.rs:427:5 [INFO] [stdout] | [INFO] [stdout] 427 | target_os = "nacl", [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `target_os` are: `aix`, `amdhsa`, `android`, `cuda`, `cygwin`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `helenos`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `lynxos178`, `macos`, `managarm`, `motor`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `psx`, `redox`, `rtems`, `solaris`, `solid_asp3`, and `teeos` and 13 more [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling rustls v0.23.35 [INFO] [stderr] Checking simd-adler32 v0.3.7 [INFO] [stderr] Checking bit-set v0.8.0 [INFO] [stderr] Checking crc32fast v1.4.2 (/opt/rustwide/workdir/crc32fast) [INFO] [stderr] Checking compression-core v0.4.30 [INFO] [stderr] Checking base64 v0.22.100 (/opt/rustwide/workdir/base64) [INFO] [stderr] Compiling syn v2.0.110 [INFO] [stderr] Checking miniz_oxide v0.8.9 [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:85:17 [INFO] [stdout] | [INFO] [stdout] 85 | let x = A { [INFO] [stdout] | _________________^ [INFO] [stdout] 86 | | a, [INFO] [stdout] 87 | | } [INFO] [stdout] 88 | | .b; [INFO] [stdout] | |__________^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:79:1 [INFO] [stdout] | [INFO] [stdout] 79 | unsafe fn debug(s: &str, a: arch::__m128i) -> arch::__m128i { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:113:18 [INFO] [stdout] | [INFO] [stdout] 113 | let mut x3 = get(&mut data); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:104:1 [INFO] [stdout] | [INFO] [stdout] 104 | unsafe fn calculate(crc: u32, mut data: &[u8]) -> u32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:114:18 [INFO] [stdout] | [INFO] [stdout] 114 | let mut x2 = get(&mut data); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:115:18 [INFO] [stdout] | [INFO] [stdout] 115 | let mut x1 = get(&mut data); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:116:18 [INFO] [stdout] | [INFO] [stdout] 116 | let mut x0 = get(&mut data); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:123:14 [INFO] [stdout] | [INFO] [stdout] 123 | x3 = reduce128(x3, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:123:28 [INFO] [stdout] | [INFO] [stdout] 123 | x3 = reduce128(x3, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:124:14 [INFO] [stdout] | [INFO] [stdout] 124 | x2 = reduce128(x2, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:124:28 [INFO] [stdout] | [INFO] [stdout] 124 | x2 = reduce128(x2, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:125:14 [INFO] [stdout] | [INFO] [stdout] 125 | x1 = reduce128(x1, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:125:28 [INFO] [stdout] | [INFO] [stdout] 125 | x1 = reduce128(x1, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:126:14 [INFO] [stdout] | [INFO] [stdout] 126 | x0 = reduce128(x0, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:126:28 [INFO] [stdout] | [INFO] [stdout] 126 | x0 = reduce128(x0, get(&mut data), k1k2); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:130:17 [INFO] [stdout] | [INFO] [stdout] 130 | let mut x = reduce128(x3, x2, k3k4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:131:9 [INFO] [stdout] | [INFO] [stdout] 131 | x = reduce128(x, x1, k3k4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:132:9 [INFO] [stdout] | [INFO] [stdout] 132 | x = reduce128(x, x0, k3k4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | x = reduce128(x, get(&mut data), k3k4); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:136:26 [INFO] [stdout] | [INFO] [stdout] 136 | x = reduce128(x, get(&mut data), k3k4); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::debug` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:139:5 [INFO] [stdout] | [INFO] [stdout] 139 | debug("128 > 64 init", x); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::debug` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:168:5 [INFO] [stdout] | [INFO] [stdout] 168 | debug("128 > 64 xx", x); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_clmulepi64_si128` with `#[target_feature]` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:193:14 [INFO] [stdout] | [INFO] [stdout] 193 | let t1 = arch::_mm_clmulepi64_si128(a, keys, 0x00); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]` [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = help: in order for the call to be safe, the context requires the following additional target feature: pclmulqdq [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:192:1 [INFO] [stdout] | [INFO] [stdout] 192 | unsafe fn reduce128(a: arch::__m128i, b: arch::__m128i, keys: arch::__m128i) -> arch::__m128i { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_clmulepi64_si128` with `#[target_feature]` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:194:14 [INFO] [stdout] | [INFO] [stdout] 194 | let t2 = arch::_mm_clmulepi64_si128(a, keys, 0x11); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]` [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = help: in order for the call to be safe, the context requires the following additional target feature: pclmulqdq [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_xor_si128` with `#[target_feature]` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:195:5 [INFO] [stdout] | [INFO] [stdout] 195 | arch::_mm_xor_si128(arch::_mm_xor_si128(b, t1), t2) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]` [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = help: in order for the call to be safe, the context requires the following additional target feature: sse2 [INFO] [stdout] = note: the sse2 target feature being enabled in the build configuration does not remove the requirement to list it in `#[target_feature]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_xor_si128` with `#[target_feature]` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:195:25 [INFO] [stdout] | [INFO] [stdout] 195 | arch::_mm_xor_si128(arch::_mm_xor_si128(b, t1), t2) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]` [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = help: in order for the call to be safe, the context requires the following additional target feature: sse2 [INFO] [stdout] = note: the sse2 target feature being enabled in the build configuration does not remove the requirement to list it in `#[target_feature]` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::arch::x86_64::_mm_loadu_si128` is unsafe and requires unsafe block [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:200:13 [INFO] [stdout] | [INFO] [stdout] 200 | let r = arch::_mm_loadu_si128(a.as_ptr() as *const arch::__m128i); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> crc32fast/src/specialized/pclmulqdq.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | unsafe fn get(a: &mut &[u8]) -> arch::__m128i { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Checking webpki-roots v1.0.4 [INFO] [stderr] Checking iri-string v0.7.9 [INFO] [stdout] warning: unexpected `cfg` condition value: `cargo-clippy` [INFO] [stdout] --> base64/src/base64.rs:223:13 [INFO] [stdout] | [INFO] [stdout] 223 | #![cfg_attr(feature = "cargo-clippy", allow(clippy::cast_lossless))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `alloc`, `default`, and `std` [INFO] [stdout] = help: consider adding `cargo-clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking unsafe_libyaml v0.2.11 (/opt/rustwide/workdir/unsafe_libyaml) [INFO] [stderr] Checking encoding_rs v0.8.35 [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:623:5 [INFO] [stdout] | [INFO] [stdout] 623 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:623:5 [INFO] [stdout] | [INFO] [stdout] 623 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:623:5 [INFO] [stdout] | [INFO] [stdout] 623 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nodes` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1077:5 [INFO] [stdout] | [INFO] [stdout] 1077 | STACK_DEL!(nodes); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nodes` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1077:5 [INFO] [stdout] | [INFO] [stdout] 1077 | STACK_DEL!(nodes); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `nodes` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1077:5 [INFO] [stdout] | [INFO] [stdout] 1077 | STACK_DEL!(nodes); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1084:5 [INFO] [stdout] | [INFO] [stdout] 1084 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1084:5 [INFO] [stdout] | [INFO] [stdout] 1084 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1084:5 [INFO] [stdout] | [INFO] [stdout] 1084 | STACK_DEL!(tag_directives_copy); [INFO] [stdout] | ------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1102:17 [INFO] [stdout] | [INFO] [stdout] 1102 | STACK_DEL!(node.data.sequence.items); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1102:17 [INFO] [stdout] | [INFO] [stdout] 1102 | STACK_DEL!(node.data.sequence.items); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1102:17 [INFO] [stdout] | [INFO] [stdout] 1102 | STACK_DEL!(node.data.sequence.items); [INFO] [stdout] | ------------------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1105:17 [INFO] [stdout] | [INFO] [stdout] 1105 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1105:17 [INFO] [stdout] | [INFO] [stdout] 1105 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1105:17 [INFO] [stdout] | [INFO] [stdout] 1105 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `items` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1269:5 [INFO] [stdout] | [INFO] [stdout] 1269 | STACK_DEL!(items); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `items` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1269:5 [INFO] [stdout] | [INFO] [stdout] 1269 | STACK_DEL!(items); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `items` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1269:5 [INFO] [stdout] | [INFO] [stdout] 1269 | STACK_DEL!(items); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `pairs` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1324:5 [INFO] [stdout] | [INFO] [stdout] 1324 | STACK_DEL!(pairs); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `pairs` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1324:5 [INFO] [stdout] | [INFO] [stdout] 1324 | STACK_DEL!(pairs); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `pairs` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/api.rs:1324:5 [INFO] [stdout] | [INFO] [stdout] 1324 | STACK_DEL!(pairs); [INFO] [stdout] | ----------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/dumper.rs:175:13 [INFO] [stdout] | [INFO] [stdout] 175 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/dumper.rs:175:13 [INFO] [stdout] | [INFO] [stdout] 175 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `node` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/dumper.rs:175:13 [INFO] [stdout] | [INFO] [stdout] 175 | STACK_DEL!(node.data.mapping.pairs); [INFO] [stdout] | ----------------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:141:5 [INFO] [stdout] | [INFO] [stdout] 141 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:141:5 [INFO] [stdout] | [INFO] [stdout] 141 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:141:5 [INFO] [stdout] | [INFO] [stdout] 141 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `ctx` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/loader.rs:138:9 [INFO] [stdout] | [INFO] [stdout] 138 | STACK_DEL!(ctx); [INFO] [stdout] | --------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/parser.rs:256:17 [INFO] [stdout] | [INFO] [stdout] 256 | tag_directives.start = tag_directives.end; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1124:25 [INFO] [stdout] | [INFO] [stdout] 1124 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1124:25 [INFO] [stdout] | [INFO] [stdout] 1124 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1124:25 [INFO] [stdout] | [INFO] [stdout] 1124 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1130:21 [INFO] [stdout] | [INFO] [stdout] 1130 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1130:21 [INFO] [stdout] | [INFO] [stdout] 1130 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1130:21 [INFO] [stdout] | [INFO] [stdout] 1130 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:377:9 [INFO] [stdout] | [INFO] [stdout] 377 | $stack.end = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1145:5 [INFO] [stdout] | [INFO] [stdout] 1145 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:378:9 [INFO] [stdout] | [INFO] [stdout] 378 | $stack.top = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1145:5 [INFO] [stdout] | [INFO] [stdout] 1145 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `tag_directives` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:379:9 [INFO] [stdout] | [INFO] [stdout] 379 | $stack.start = ptr::null_mut(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/parser.rs:1145:5 [INFO] [stdout] | [INFO] [stdout] 1145 | STACK_DEL!(tag_directives); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling jobserver v0.1.34 [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1028:5 [INFO] [stdout] | [INFO] [stdout] 1028 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1264:5 [INFO] [stdout] | [INFO] [stdout] 1264 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1432:5 [INFO] [stdout] | [INFO] [stdout] 1432 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1456:17 [INFO] [stdout] | [INFO] [stdout] 1456 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1850:5 [INFO] [stdout] | [INFO] [stdout] 1850 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1851:5 [INFO] [stdout] | [INFO] [stdout] 1851 | STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1836:49 [INFO] [stdout] | [INFO] [stdout] 1836 | ... STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1852:5 [INFO] [stdout] | [INFO] [stdout] 1852 | STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:1837:49 [INFO] [stdout] | [INFO] [stdout] 1837 | ... STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> base64/src/chunked_encoder.rs:60:26 [INFO] [stdout] | [INFO] [stdout] 60 | pub(crate) fn new(s: &mut String) -> StringSink { [INFO] [stdout] | ^^^^^^^^^^^ ^^^^^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 60 | pub(crate) fn new(s: &mut String) -> StringSink<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling rayon-core v1.13.0 [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2281:5 [INFO] [stdout] | [INFO] [stdout] 2281 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2282:5 [INFO] [stdout] | [INFO] [stdout] 2282 | STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2276:9 [INFO] [stdout] | [INFO] [stdout] 2276 | STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2283:5 [INFO] [stdout] | [INFO] [stdout] 2283 | STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2277:9 [INFO] [stdout] | [INFO] [stdout] 2277 | STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `whitespaces` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2284:5 [INFO] [stdout] | [INFO] [stdout] 2284 | STRING_DEL!(whitespaces); [INFO] [stdout] | ------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `whitespaces` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2278:9 [INFO] [stdout] | [INFO] [stdout] 2278 | STRING_DEL!(whitespaces); [INFO] [stdout] | ------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/src/lib.rs:29:7 [INFO] [stdout] | [INFO] [stdout] 29 | #[cfg(feature = "phf")] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `phf` [INFO] [stdout] --> mime_guess/src/lib.rs:33:11 [INFO] [stdout] | [INFO] [stdout] 33 | #[cfg(not(feature = "phf"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `rev-mappings` [INFO] [stdout] = help: consider adding `phf` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `string` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2450:5 [INFO] [stdout] | [INFO] [stdout] 2450 | STRING_DEL!(string); [INFO] [stdout] | ------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2451:5 [INFO] [stdout] | [INFO] [stdout] 2451 | STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `leading_break` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2445:9 [INFO] [stdout] | [INFO] [stdout] 2445 | STRING_DEL!(leading_break); [INFO] [stdout] | -------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2452:5 [INFO] [stdout] | [INFO] [stdout] 2452 | STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `trailing_breaks` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2446:9 [INFO] [stdout] | [INFO] [stdout] 2446 | STRING_DEL!(trailing_breaks); [INFO] [stdout] | ---------------------------- in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `whitespaces` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2453:5 [INFO] [stdout] | [INFO] [stdout] 2453 | STRING_DEL!(whitespaces); [INFO] [stdout] | ------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `whitespaces` is never read [INFO] [stdout] --> unsafe_libyaml/src/macros.rs:50:9 [INFO] [stdout] | [INFO] [stdout] 50 | $string.start = $string.pointer; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] ::: unsafe_libyaml/src/scanner.rs:2447:9 [INFO] [stdout] | [INFO] [stdout] 2447 | STRING_DEL!(whitespaces); [INFO] [stdout] | ------------------------ in this macro invocation [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling same-file v1.0.6 [INFO] [stderr] Checking http-body v1.0.1 [INFO] [stderr] Checking http-body-util v0.1.3 [INFO] [stderr] Compiling zeroize v1.8.2 [INFO] [stderr] Checking const-oid v0.10.1 [INFO] [stderr] Compiling untrusted v0.7.1 [INFO] [stderr] Compiling walkdir v2.5.0 [INFO] [stderr] Checking ciborium-io v0.2.2 [INFO] [stderr] Checking clap_builder v4.5.51 [INFO] [stderr] Checking flate2 v1.1.5 [INFO] [stderr] Checking itertools v0.10.5 [INFO] [stderr] Compiling anyerr v1.0.86 (/opt/rustwide/workdir/anyerr) [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/build.rs:10:11 [INFO] [stdout] | [INFO] [stdout] 10 | #[cfg(all(feature = "backtrace", not(feature = "std")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling async-trait v0.1.80 (/opt/rustwide/workdir/async-trait) [INFO] [stderr] Checking hex v0.4.3 (/opt/rustwide/workdir/hex) [INFO] [stderr] Compiling cc v1.2.45 [INFO] [stderr] Checking cast v0.3.0 [INFO] [stderr] Checking keccak v0.2.0-pre.0 [INFO] [stderr] Checking rayon v1.11.0 [INFO] [stderr] Checking plotters v0.3.7 [INFO] [stderr] Checking is-terminal v0.4.17 [INFO] [stderr] Checking net v0.1.0 (/opt/rustwide/workdir/net) [INFO] [stderr] Checking oorandom v11.1.5 [INFO] [stderr] Checking anes v0.1.6 [INFO] [stderr] Checking getopts v0.2.21 (/opt/rustwide/workdir/getopts) [INFO] [stderr] Checking serde_bytes v0.11.19 [INFO] [stderr] Checking constant_time_eq v0.3.0 (/opt/rustwide/workdir/constant_time_eq) [INFO] [stderr] Checking memmem v0.1.1 (/opt/rustwide/workdir/memmem) [INFO] [stderr] Checking hostname v0.3.1 (/opt/rustwide/workdir/hostname) [INFO] [stdout] warning: lint `non_fmt_panic` has been renamed to `non_fmt_panics` [INFO] [stdout] --> hex/tests/version-number.rs:1:10 [INFO] [stdout] | [INFO] [stdout] 1 | #![allow(non_fmt_panic)] [INFO] [stdout] | ^^^^^^^^^^^^^ help: use the new name: `non_fmt_panics` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `state` is never read [INFO] [stdout] --> memmem/src/two_way.rs:264:13 [INFO] [stdout] | [INFO] [stdout] 264 | state.position += self.needle.len(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: value assigned to `state` is never read [INFO] [stdout] --> memmem/src/two_way.rs:266:17 [INFO] [stdout] | [INFO] [stdout] 266 | state.memory = 0; // set to needle.len() - self.period for overlapping matches [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: maybe it is overwritten before being read? [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:4:31 [INFO] [stdout] | [INFO] [stdout] 4 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:7:30 [INFO] [stdout] | [INFO] [stdout] 7 | #[cfg(not(any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:17:31 [INFO] [stdout] | [INFO] [stdout] 17 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:24:26 [INFO] [stdout] | [INFO] [stdout] 24 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:31:30 [INFO] [stdout] | [INFO] [stdout] 31 | #[cfg(not(any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:51:24 [INFO] [stdout] | [INFO] [stdout] 51 | any(std_backtrace, feature = "backtrace") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:59:52 [INFO] [stdout] | [INFO] [stdout] 59 | #[cfg(all(feature = "std", not(std_backtrace), not(feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:66:31 [INFO] [stdout] | [INFO] [stdout] 66 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:703:64 [INFO] [stdout] | [INFO] [stdout] 703 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:824:64 [INFO] [stdout] | [INFO] [stdout] 824 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:360:30 [INFO] [stdout] | [INFO] [stdout] 360 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:106:76 [INFO] [stdout] | [INFO] [stdout] 106 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:131:76 [INFO] [stdout] | [INFO] [stdout] 131 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:157:76 [INFO] [stdout] | [INFO] [stdout] 157 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:188:76 [INFO] [stdout] | [INFO] [stdout] 188 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:211:76 [INFO] [stdout] | [INFO] [stdout] 211 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:322:76 [INFO] [stdout] | [INFO] [stdout] 322 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:602:68 [INFO] [stdout] | [INFO] [stdout] 602 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:891:30 [INFO] [stdout] | [INFO] [stdout] 891 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/fmt.rs:42:34 [INFO] [stdout] | [INFO] [stdout] 42 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11 [INFO] [stdout] | [INFO] [stdout] 46 | while *end != 0 { [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1 [INFO] [stdout] | [INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15 [INFO] [stdout] | [INFO] [stdout] 47 | end = end.add(1); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | end.offset_from(s) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:49:8 [INFO] [stdout] | [INFO] [stdout] 49 | if yaml_emitter_initialize(emitter).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:46:1 [INFO] [stdout] | [INFO] [stdout] 46 | pub(crate) unsafe fn unsafe_main(stdin: &mut dyn Read, mut stdout: &mut dyn Write) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_output` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:62:5 [INFO] [stdout] | [INFO] [stdout] 62 | yaml_emitter_set_output(emitter, write_to_stdio, addr_of_mut!(stdout).cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_canonical` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:63:5 [INFO] [stdout] | [INFO] [stdout] 63 | yaml_emitter_set_canonical(emitter, false); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_unicode` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:64:5 [INFO] [stdout] | [INFO] [stdout] 64 | yaml_emitter_set_unicode(emitter, false); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_stream_start_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:78:13 [INFO] [stdout] | [INFO] [stdout] 78 | yaml_stream_start_event_initialize(event, YAML_UTF8_ENCODING) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_stream_end_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:80:13 [INFO] [stdout] | [INFO] [stdout] 80 | yaml_stream_end_event_initialize(event) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_document_start_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:83:13 [INFO] [stdout] | [INFO] [stdout] 83 | / yaml_document_start_event_initialize( [INFO] [stdout] 84 | | event, [INFO] [stdout] 85 | | ptr::null_mut::(), [INFO] [stdout] 86 | | ptr::null_mut::(), [INFO] [stdout] 87 | | ptr::null_mut::(), [INFO] [stdout] 88 | | implicit, [INFO] [stdout] 89 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_document_end_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:92:13 [INFO] [stdout] | [INFO] [stdout] 92 | yaml_document_end_event_initialize(event, implicit) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_mapping_start_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:94:13 [INFO] [stdout] | [INFO] [stdout] 94 | / yaml_mapping_start_event_initialize( [INFO] [stdout] 95 | | event, [INFO] [stdout] 96 | | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] 97 | | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] 98 | | false, [INFO] [stdout] 99 | | YAML_BLOCK_MAPPING_STYLE, [INFO] [stdout] 100 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:96:17 [INFO] [stdout] | [INFO] [stdout] 96 | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:97:17 [INFO] [stdout] | [INFO] [stdout] 97 | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_mapping_end_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:102:13 [INFO] [stdout] | [INFO] [stdout] 102 | yaml_mapping_end_event_initialize(event) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_sequence_start_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:104:13 [INFO] [stdout] | [INFO] [stdout] 104 | / yaml_sequence_start_event_initialize( [INFO] [stdout] 105 | | event, [INFO] [stdout] 106 | | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] 107 | | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] 108 | | false, [INFO] [stdout] 109 | | YAML_BLOCK_SEQUENCE_STYLE, [INFO] [stdout] 110 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:106:17 [INFO] [stdout] | [INFO] [stdout] 106 | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:107:17 [INFO] [stdout] | [INFO] [stdout] 107 | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_sequence_end_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:112:13 [INFO] [stdout] | [INFO] [stdout] 112 | yaml_sequence_end_event_initialize(event) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_value` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:116:13 [INFO] [stdout] | [INFO] [stdout] 116 | get_value(line, value.as_mut_ptr(), &mut style); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:117:28 [INFO] [stdout] | [INFO] [stdout] 117 | let implicit = get_tag(line, tag.as_mut_ptr()).is_null(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_scalar_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:118:13 [INFO] [stdout] | [INFO] [stdout] 118 | / yaml_scalar_event_initialize( [INFO] [stdout] 119 | | event, [INFO] [stdout] 120 | | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] 121 | | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] ... | [INFO] [stdout] 126 | | style, [INFO] [stdout] 127 | | ) [INFO] [stdout] | |_____________^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:120:17 [INFO] [stdout] | [INFO] [stdout] 120 | get_anchor(b'&', line, anchor.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:121:17 [INFO] [stdout] | [INFO] [stdout] 121 | get_tag(line, tag.as_mut_ptr()), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_alias_event_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:129:13 [INFO] [stdout] | [INFO] [stdout] 129 | yaml_alias_event_initialize(event, get_anchor(b'*', line, anchor.as_mut_ptr())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:129:48 [INFO] [stdout] | [INFO] [stdout] 129 | yaml_alias_event_initialize(event, get_anchor(b'*', line, anchor.as_mut_ptr())) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:132:54 [INFO] [stdout] | [INFO] [stdout] 132 | break Err(format!("Unknown event: '{}'", CStr::from_ptr(line)).into()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_emit` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:138:12 [INFO] [stdout] | [INFO] [stdout] 138 | if yaml_emitter_emit(emitter, event).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:139:29 [INFO] [stdout] | [INFO] [stdout] 139 | break Err(match (*emitter).error { [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:66 [INFO] [stdout] | [INFO] [stdout] 141 | YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:81 [INFO] [stdout] | [INFO] [stdout] 141 | YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:68 [INFO] [stdout] | [INFO] [stdout] 142 | YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:83 [INFO] [stdout] | [INFO] [stdout] 142 | YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | yaml_emitter_delete(emitter); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:4:31 [INFO] [stdout] | [INFO] [stdout] 4 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:7:30 [INFO] [stdout] | [INFO] [stdout] 7 | #[cfg(not(any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:17:31 [INFO] [stdout] | [INFO] [stdout] 17 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:24:26 [INFO] [stdout] | [INFO] [stdout] 24 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:31:30 [INFO] [stdout] | [INFO] [stdout] 31 | #[cfg(not(any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:51:24 [INFO] [stdout] | [INFO] [stdout] 51 | any(std_backtrace, feature = "backtrace") [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:59:52 [INFO] [stdout] | [INFO] [stdout] 59 | #[cfg(all(feature = "std", not(std_backtrace), not(feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/backtrace.rs:66:31 [INFO] [stdout] | [INFO] [stdout] 66 | #[cfg(all(not(std_backtrace), feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:55:21 [INFO] [stdout] | [INFO] [stdout] 55 | let bytes = slice::from_raw_parts(buffer.cast(), size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:53:5 [INFO] [stdout] | [INFO] [stdout] 53 | unsafe fn write_to_stdio(data: *mut c_void, buffer: *mut u8, size: u64) -> i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:703:64 [INFO] [stdout] | [INFO] [stdout] 703 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:824:64 [INFO] [stdout] | [INFO] [stdout] 824 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:360:30 [INFO] [stdout] | [INFO] [stdout] 360 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:106:76 [INFO] [stdout] | [INFO] [stdout] 106 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:131:76 [INFO] [stdout] | [INFO] [stdout] 131 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:157:76 [INFO] [stdout] | [INFO] [stdout] 157 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:188:76 [INFO] [stdout] | [INFO] [stdout] 188 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:211:76 [INFO] [stdout] | [INFO] [stdout] 211 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:322:76 [INFO] [stdout] | [INFO] [stdout] 322 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:602:68 [INFO] [stdout] | [INFO] [stdout] 602 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/error.rs:891:30 [INFO] [stdout] | [INFO] [stdout] 891 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace` [INFO] [stdout] --> anyerr/src/fmt.rs:42:34 [INFO] [stdout] | [INFO] [stdout] 42 | #[cfg(any(std_backtrace, feature = "backtrace"))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `default` and `std` [INFO] [stdout] = help: consider adding `backtrace` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:56:15 [INFO] [stdout] | [INFO] [stdout] 56 | match (*stdout).write(bytes) { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:207:5 [INFO] [stdout] | [INFO] [stdout] 207 | ptr::copy_nonoverlapping(line[start..end].as_ptr(), anchor, end - start); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:198:1 [INFO] [stdout] | [INFO] [stdout] 198 | unsafe fn get_anchor(sigil: u8, line: &[u8], anchor: *mut u8) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:208:5 [INFO] [stdout] | [INFO] [stdout] 208 | *anchor.add(end - start) = b'\0'; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:208:6 [INFO] [stdout] | [INFO] [stdout] 208 | *anchor.add(end - start) = b'\0'; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:221:5 [INFO] [stdout] | [INFO] [stdout] 221 | ptr::copy_nonoverlapping(line[start..end].as_ptr(), tag, end - start); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:212:1 [INFO] [stdout] | [INFO] [stdout] 212 | unsafe fn get_tag(line: &[u8], tag: *mut u8) -> *mut u8 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:222:5 [INFO] [stdout] | [INFO] [stdout] 222 | *tag.add(end - start) = b'\0'; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:222:6 [INFO] [stdout] | [INFO] [stdout] 222 | *tag.add(end - start) = b'\0'; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:230:15 [INFO] [stdout] | [INFO] [stdout] 230 | let end = line.add(line_len); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:226:1 [INFO] [stdout] | [INFO] [stdout] 226 | unsafe fn get_value(line: &[u8], value: *mut i8, style: *mut yaml_scalar_style_t) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:231:17 [INFO] [stdout] | [INFO] [stdout] 231 | let mut c = line.offset(4); [INFO] [stdout] | ^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:233:12 [INFO] [stdout] | [INFO] [stdout] 233 | if *c as u8 == b' ' { [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:234:21 [INFO] [stdout] | [INFO] [stdout] 234 | start = c.offset(1); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:235:13 [INFO] [stdout] | [INFO] [stdout] 235 | *style = match *start as u8 { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:235:28 [INFO] [stdout] | [INFO] [stdout] 235 | *style = match *start as u8 { [INFO] [stdout] | ^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:243:25 [INFO] [stdout] | [INFO] [stdout] 243 | c = c.offset(1); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:247:21 [INFO] [stdout] | [INFO] [stdout] 247 | start = start.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:250:13 [INFO] [stdout] | [INFO] [stdout] 250 | c = c.offset(1); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:9 [INFO] [stdout] | [INFO] [stdout] 259 | *value.offset(i) = if *c as u8 == b'\\' { [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:10 [INFO] [stdout] | [INFO] [stdout] 259 | *value.offset(i) = if *c as u8 == b'\\' { [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:31 [INFO] [stdout] | [INFO] [stdout] 259 | *value.offset(i) = if *c as u8 == b'\\' { [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:260:17 [INFO] [stdout] | [INFO] [stdout] 260 | c = c.offset(1); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:261:19 [INFO] [stdout] | [INFO] [stdout] 261 | match *c as u8 { [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:271:13 [INFO] [stdout] | [INFO] [stdout] 271 | *c [INFO] [stdout] | ^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:274:13 [INFO] [stdout] | [INFO] [stdout] 274 | c = c.offset(1); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:276:5 [INFO] [stdout] | [INFO] [stdout] 276 | *value.offset(i) = b'\0' as i8; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:276:6 [INFO] [stdout] | [INFO] [stdout] 276 | *value.offset(i) = b'\0' as i8; [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:139:29 [INFO] [stdout] | [INFO] [stdout] 139 | break Err(match (*emitter).error { [INFO] [stdout] | ^^-------^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_emitter_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] = note: `#[deny(dangerous_implicit_autorefs)]` on by default [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 139 | break Err(match (&(*emitter)).error { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:81 [INFO] [stdout] | [INFO] [stdout] 141 | YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^-------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_emitter_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 141 | YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((&(*emitter)).problem)).into(), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:83 [INFO] [stdout] | [INFO] [stdout] 142 | YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(), [INFO] [stdout] | ^^-------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_emitter_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 142 | YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((&(*emitter)).problem)).into(), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-emitter-test-suite" test) due to 3 previous errors; 60 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11 [INFO] [stdout] | [INFO] [stdout] 46 | while *end != 0 { [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1 [INFO] [stdout] | [INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15 [INFO] [stdout] | [INFO] [stdout] 47 | end = end.add(1); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | end.offset_from(s) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:44:8 [INFO] [stdout] | [INFO] [stdout] 44 | if yaml_parser_initialize(parser).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | pub(crate) unsafe fn unsafe_main(mut stdin: &mut dyn Read, stdout: &mut dyn Write) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_set_input` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:60:5 [INFO] [stdout] | [INFO] [stdout] 60 | yaml_parser_set_input(parser, read_from_stdio, addr_of_mut!(stdin).cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_parse` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:65:12 [INFO] [stdout] | [INFO] [stdout] 65 | if yaml_parser_parse(parser, event).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:56 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22 [INFO] [stdout] | [INFO] [stdout] 71 | ((*parser).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22 [INFO] [stdout] | [INFO] [stdout] 72 | ((*parser).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:75:13 [INFO] [stdout] | [INFO] [stdout] 75 | yaml_parser_delete(parser); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:79:40 [INFO] [stdout] | [INFO] [stdout] 79 | let type_: yaml_event_type_t = (*event).type_; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17 [INFO] [stdout] | [INFO] [stdout] 88 | if !(*event).data.document_start.implicit { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17 [INFO] [stdout] | [INFO] [stdout] 88 | if !(*event).data.document_start.implicit { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17 [INFO] [stdout] | [INFO] [stdout] 94 | if !(*event).data.document_end.implicit { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17 [INFO] [stdout] | [INFO] [stdout] 94 | if !(*event).data.document_end.implicit { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17 [INFO] [stdout] | [INFO] [stdout] 100 | if !(*event).data.mapping_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17 [INFO] [stdout] | [INFO] [stdout] 100 | if !(*event).data.mapping_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:48 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17 [INFO] [stdout] | [INFO] [stdout] 103 | if !(*event).data.mapping_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17 [INFO] [stdout] | [INFO] [stdout] 103 | if !(*event).data.mapping_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:49 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17 [INFO] [stdout] | [INFO] [stdout] 111 | if !(*event).data.sequence_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17 [INFO] [stdout] | [INFO] [stdout] 111 | if !(*event).data.sequence_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:48 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17 [INFO] [stdout] | [INFO] [stdout] 114 | if !(*event).data.sequence_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17 [INFO] [stdout] | [INFO] [stdout] 114 | if !(*event).data.sequence_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:49 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11 [INFO] [stdout] | [INFO] [stdout] 46 | while *end != 0 { [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1 [INFO] [stdout] | [INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17 [INFO] [stdout] | [INFO] [stdout] 122 | if !(*event).data.scalar.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17 [INFO] [stdout] | [INFO] [stdout] 122 | if !(*event).data.scalar.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:48 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | if !(*event).data.scalar.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | if !(*event).data.scalar.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:49 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44 [INFO] [stdout] | [INFO] [stdout] 128 | let _ = stdout.write_all(match (*event).data.scalar.style { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44 [INFO] [stdout] | [INFO] [stdout] 128 | let _ = stdout.write_all(match (*event).data.scalar.style { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `print_escaped` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:50 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_event_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:144:9 [INFO] [stdout] | [INFO] [stdout] 144 | yaml_event_delete(event); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | yaml_parser_delete(parser); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:50:21 [INFO] [stdout] | [INFO] [stdout] 50 | let slice = slice::from_raw_parts_mut(buffer.cast(), size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:48:5 [INFO] [stdout] | [INFO] [stdout] 48 | unsafe fn read_from_stdio(data: *mut c_void, buffer: *mut u8, size: u64, size_read: *mut u64) -> i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:51:15 [INFO] [stdout] | [INFO] [stdout] 51 | match (*stdin).read(slice) { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:53:17 [INFO] [stdout] | [INFO] [stdout] 53 | *size_read = n as u64; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:154:15 [INFO] [stdout] | [INFO] [stdout] 154 | let end = str.offset(length as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:153:1 [INFO] [stdout] | [INFO] [stdout] 153 | unsafe fn print_escaped(stdout: &mut dyn Write, mut str: *mut u8, length: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:156:27 [INFO] [stdout] | [INFO] [stdout] 156 | let repr = match &*str { [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:166:15 [INFO] [stdout] | [INFO] [stdout] 166 | str = str.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15 [INFO] [stdout] | [INFO] [stdout] 47 | end = end.add(1); [INFO] [stdout] | ^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::::offset_from` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5 [INFO] [stdout] | [INFO] [stdout] 49 | end.offset_from(s) as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_initialize` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:44:8 [INFO] [stdout] | [INFO] [stdout] 44 | if yaml_parser_initialize(parser).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:41:1 [INFO] [stdout] | [INFO] [stdout] 41 | pub(crate) unsafe fn unsafe_main(mut stdin: &mut dyn Read, stdout: &mut dyn Write) -> Result<(), Box> { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_set_input` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:60:5 [INFO] [stdout] | [INFO] [stdout] 60 | yaml_parser_set_input(parser, read_from_stdio, addr_of_mut!(stdin).cast()); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_parse` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:65:12 [INFO] [stdout] | [INFO] [stdout] 65 | if yaml_parser_parse(parser, event).fail { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:56 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22 [INFO] [stdout] | [INFO] [stdout] 71 | ((*parser).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22 [INFO] [stdout] | [INFO] [stdout] 72 | ((*parser).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:75:13 [INFO] [stdout] | [INFO] [stdout] 75 | yaml_parser_delete(parser); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:79:40 [INFO] [stdout] | [INFO] [stdout] 79 | let type_: yaml_event_type_t = (*event).type_; [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17 [INFO] [stdout] | [INFO] [stdout] 88 | if !(*event).data.document_start.implicit { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17 [INFO] [stdout] | [INFO] [stdout] 88 | if !(*event).data.document_start.implicit { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17 [INFO] [stdout] | [INFO] [stdout] 94 | if !(*event).data.document_end.implicit { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17 [INFO] [stdout] | [INFO] [stdout] 94 | if !(*event).data.document_end.implicit { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17 [INFO] [stdout] | [INFO] [stdout] 100 | if !(*event).data.mapping_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17 [INFO] [stdout] | [INFO] [stdout] 100 | if !(*event).data.mapping_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:48 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63 [INFO] [stdout] | [INFO] [stdout] 101 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17 [INFO] [stdout] | [INFO] [stdout] 103 | if !(*event).data.mapping_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17 [INFO] [stdout] | [INFO] [stdout] 103 | if !(*event).data.mapping_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:49 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64 [INFO] [stdout] | [INFO] [stdout] 104 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17 [INFO] [stdout] | [INFO] [stdout] 111 | if !(*event).data.sequence_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17 [INFO] [stdout] | [INFO] [stdout] 111 | if !(*event).data.sequence_start.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:48 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] = note: `#[deny(dangerous_implicit_autorefs)]` on by default [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((&(*parser)).problem)); [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 67 | if (&(*parser)).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (&(*parser)).problem_mark.column != 0 { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22 [INFO] [stdout] | [INFO] [stdout] 71 | ((*parser).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 71 | ((&(*parser)).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22 [INFO] [stdout] | [INFO] [stdout] 72 | ((*parser).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 72 | ((&(*parser)).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63 [INFO] [stdout] | [INFO] [stdout] 112 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17 [INFO] [stdout] | [INFO] [stdout] 114 | if !(*event).data.sequence_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17 [INFO] [stdout] | [INFO] [stdout] 114 | if !(*event).data.sequence_start.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:49 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64 [INFO] [stdout] | [INFO] [stdout] 115 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17 [INFO] [stdout] | [INFO] [stdout] 122 | if !(*event).data.scalar.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17 [INFO] [stdout] | [INFO] [stdout] 122 | if !(*event).data.scalar.anchor.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:48 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63 [INFO] [stdout] | [INFO] [stdout] 123 | let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | if !(*event).data.scalar.tag.is_null() { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17 [INFO] [stdout] | [INFO] [stdout] 125 | if !(*event).data.scalar.tag.is_null() { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:49 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64 [INFO] [stdout] | [INFO] [stdout] 126 | let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44 [INFO] [stdout] | [INFO] [stdout] 128 | let _ = stdout.write_all(match (*event).data.scalar.style { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44 [INFO] [stdout] | [INFO] [stdout] 128 | let _ = stdout.write_all(match (*event).data.scalar.style { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `print_escaped` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:13 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63 [INFO] [stdout] | [INFO] [stdout] 136 | print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:50 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ access to union field [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65 [INFO] [stdout] | [INFO] [stdout] 139 | let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),); [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_event_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:144:9 [INFO] [stdout] | [INFO] [stdout] 144 | yaml_event_delete(event); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:149:5 [INFO] [stdout] | [INFO] [stdout] 149 | yaml_parser_delete(parser); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:50:21 [INFO] [stdout] | [INFO] [stdout] 50 | let slice = slice::from_raw_parts_mut(buffer.cast(), size as usize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:48:5 [INFO] [stdout] | [INFO] [stdout] 48 | unsafe fn read_from_stdio(data: *mut c_void, buffer: *mut u8, size: u64, size_read: *mut u64) -> i32 { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:51:15 [INFO] [stdout] | [INFO] [stdout] 51 | match (*stdin).read(slice) { [INFO] [stdout] | ^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:53:17 [INFO] [stdout] | [INFO] [stdout] 53 | *size_read = n as u64; [INFO] [stdout] | ^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:154:15 [INFO] [stdout] | [INFO] [stdout] 154 | let end = str.offset(length as isize); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:153:1 [INFO] [stdout] | [INFO] [stdout] 153 | unsafe fn print_escaped(stdout: &mut dyn Write, mut str: *mut u8, length: u64) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:156:27 [INFO] [stdout] | [INFO] [stdout] 156 | let repr = match &*str { [INFO] [stdout] | ^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::::offset` is unsafe and requires unsafe block [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:166:15 [INFO] [stdout] | [INFO] [stdout] 166 | str = str.offset(1); [INFO] [stdout] | ^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:389:18 [INFO] [stdout] | [INFO] [stdout] 389 | pub fn chain(&self) -> Chain { [INFO] [stdout] | ^^^^^ ^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 389 | pub fn chain(&self) -> Chain<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:864:14 [INFO] [stdout] | [INFO] [stdout] 864 | fn erase(&self) -> Ref { [INFO] [stdout] | ^^^^^ ^^^^^^^^^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 864 | fn erase(&self) -> Ref<'_, ErrorImpl> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:873:38 [INFO] [stdout] | [INFO] [stdout] 873 | pub(crate) unsafe fn error(this: Ref) -> &(dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 873 | pub(crate) unsafe fn error(this: Ref<'_, Self>) -> &(dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-parser-test-suite" test) due to 5 previous errors; 66 warnings emitted [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71 [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem)); [INFO] [stdout] | ^^------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] = note: `#[deny(dangerous_implicit_autorefs)]` on by default [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 66 | let mut error = format!("Parse error: {}", CStr::from_ptr((&(*parser)).problem)); [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 67 | if (&(*parser)).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52 [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 { [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 67 | if (*parser).problem_mark.line != 0 || (&(*parser)).problem_mark.column != 0 { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:880:42 [INFO] [stdout] | [INFO] [stdout] 880 | pub(crate) unsafe fn error_mut(this: Mut) -> &mut (dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 880 | pub(crate) unsafe fn error_mut(this: Mut<'_, Self>) -> &mut (dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22 [INFO] [stdout] | [INFO] [stdout] 71 | ((*parser).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 71 | ((&(*parser)).problem_mark.line).wrapping_add(1_u64), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:892:42 [INFO] [stdout] | [INFO] [stdout] 892 | pub(crate) unsafe fn backtrace(this: Ref) -> &Backtrace { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 892 | pub(crate) unsafe fn backtrace(this: Ref<'_, Self>) -> &Backtrace { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/ptr.rs:47:19 [INFO] [stdout] | [INFO] [stdout] 47 | pub fn by_ref(&self) -> Ref { [INFO] [stdout] | ^^^^^ ^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 47 | pub fn by_ref(&self) -> Ref<'_, T> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/ptr.rs:54:19 [INFO] [stdout] | [INFO] [stdout] 54 | pub fn by_mut(&mut self) -> Mut { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 54 | pub fn by_mut(&mut self) -> Mut<'_, T> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22 [INFO] [stdout] | [INFO] [stdout] 72 | ((*parser).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 72 | ((&(*parser)).problem_mark.column).wrapping_add(1_u64), [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:389:18 [INFO] [stdout] | [INFO] [stdout] 389 | pub fn chain(&self) -> Chain { [INFO] [stdout] | ^^^^^ ^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 389 | pub fn chain(&self) -> Chain<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:864:14 [INFO] [stdout] | [INFO] [stdout] 864 | fn erase(&self) -> Ref { [INFO] [stdout] | ^^^^^ ^^^^^^^^^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 864 | fn erase(&self) -> Ref<'_, ErrorImpl> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:873:38 [INFO] [stdout] | [INFO] [stdout] 873 | pub(crate) unsafe fn error(this: Ref) -> &(dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 873 | pub(crate) unsafe fn error(this: Ref<'_, Self>) -> &(dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:880:42 [INFO] [stdout] | [INFO] [stdout] 880 | pub(crate) unsafe fn error_mut(this: Mut) -> &mut (dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 880 | pub(crate) unsafe fn error_mut(this: Mut<'_, Self>) -> &mut (dyn StdError + Send + Sync + 'static) { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/error.rs:892:42 [INFO] [stdout] | [INFO] [stdout] 892 | pub(crate) unsafe fn backtrace(this: Ref) -> &Backtrace { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^^^^^ the same lifetime is elided here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is hidden here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 892 | pub(crate) unsafe fn backtrace(this: Ref<'_, Self>) -> &Backtrace { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/ptr.rs:47:19 [INFO] [stdout] | [INFO] [stdout] 47 | pub fn by_ref(&self) -> Ref { [INFO] [stdout] | ^^^^^ ^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 47 | pub fn by_ref(&self) -> Ref<'_, T> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing [INFO] [stdout] --> anyerr/src/ptr.rs:54:19 [INFO] [stdout] | [INFO] [stdout] 54 | pub fn by_mut(&mut self) -> Mut { [INFO] [stdout] | ^^^^^^^^^ ^^^^^^ the same lifetime is hidden here [INFO] [stdout] | | [INFO] [stdout] | the lifetime is elided here [INFO] [stdout] | [INFO] [stdout] = help: the same lifetime is referred to in inconsistent ways, making the signature confusing [INFO] [stdout] help: use `'_` for type paths [INFO] [stdout] | [INFO] [stdout] 54 | pub fn by_mut(&mut self) -> Mut<'_, T> { [INFO] [stdout] | +++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-parser-test-suite") due to 5 previous errors; 66 warnings emitted [INFO] running `Command { std: "docker" "inspect" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }` [INFO] [stdout] d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662