1
Fork 0

Update more 2024 tests to remove -Zunstable-options

This commit is contained in:
Eric Huss 2024-11-28 09:47:37 -08:00
parent a2545fd6fc
commit 6005d1c9f7
77 changed files with 136 additions and 177 deletions

View file

@ -1,5 +1,5 @@
//@ edition:2024 //@ edition:2024
//@ compile-flags:--test --test-args=--test-threads=1 -Z unstable-options //@ compile-flags:--test --test-args=--test-threads=1
//@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR" //@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR"
//@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME" //@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME"
//@ failure-status: 101 //@ failure-status: 101

View file

@ -4,7 +4,7 @@
//@[edition2015]compile-flags:--test --test-args=--test-threads=1 //@[edition2015]compile-flags:--test --test-args=--test-threads=1
//@[edition2024]edition:2015 //@[edition2024]edition:2015
//@[edition2024]aux-build:extern_macros.rs //@[edition2024]aux-build:extern_macros.rs
//@[edition2024]compile-flags:--test --test-args=--test-threads=1 -Z unstable-options //@[edition2024]compile-flags:--test --test-args=--test-threads=1
//@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR" //@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR"
//@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME" //@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME"
//@ check-pass //@ check-pass

View file

@ -6,7 +6,7 @@
//@[edition2015]compile-flags:--test --test-args=--test-threads=1 //@[edition2015]compile-flags:--test --test-args=--test-threads=1
//@[edition2024]edition:2024 //@[edition2024]edition:2024
//@[edition2024]check-pass //@[edition2024]check-pass
//@[edition2024]compile-flags:--test --test-args=--test-threads=1 -Z unstable-options //@[edition2024]compile-flags:--test --test-args=--test-threads=1
//@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR" //@ normalize-stdout-test: "tests/rustdoc-ui/doctest" -> "$$DIR"
//@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME" //@ normalize-stdout-test: "finished in \d+\.\d+s" -> "finished in $$TIME"

View file

@ -1,4 +1,4 @@
//@ compile-flags: --edition 2024 -Zunstable-options //@ compile-flags: --edition 2024
//@ check-pass //@ check-pass
#![feature(async_iterator, gen_blocks)] #![feature(async_iterator, gen_blocks)]

View file

@ -1,4 +1,4 @@
//@ compile-flags: --edition 2024 -Zunstable-options //@ compile-flags: --edition 2024
//@ check-pass //@ check-pass
#![feature(async_iterator, gen_blocks, noop_waker)] #![feature(async_iterator, gen_blocks, noop_waker)]

View file

@ -2,7 +2,6 @@
//@ compile-flags: -Z validate-mir //@ compile-flags: -Z validate-mir
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] compile-flags: -Z unstable-options
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
#![feature(let_chains)] #![feature(let_chains)]

View file

@ -1,5 +1,5 @@
error: `if let` assigns a shorter lifetime since Edition 2024 error: `if let` assigns a shorter lifetime since Edition 2024
--> $DIR/lint-if-let-rescope-gated.rs:27:8 --> $DIR/lint-if-let-rescope-gated.rs:26:8
| |
LL | if let Some(_value) = Droppy.get() { LL | if let Some(_value) = Droppy.get() {
| ^^^^^^^^^^^^^^^^^^^------^^^^^^ | ^^^^^^^^^^^^^^^^^^^------^^^^^^
@ -9,12 +9,12 @@ LL | if let Some(_value) = Droppy.get() {
= warning: this changes meaning in Rust 2024 = warning: this changes meaning in Rust 2024
= note: for more information, see issue #124085 <https://github.com/rust-lang/rust/issues/124085> = note: for more information, see issue #124085 <https://github.com/rust-lang/rust/issues/124085>
help: the value is now dropped here in Edition 2024 help: the value is now dropped here in Edition 2024
--> $DIR/lint-if-let-rescope-gated.rs:31:5 --> $DIR/lint-if-let-rescope-gated.rs:30:5
| |
LL | } else { LL | } else {
| ^ | ^
note: the lint level is defined here note: the lint level is defined here
--> $DIR/lint-if-let-rescope-gated.rs:11:9 --> $DIR/lint-if-let-rescope-gated.rs:10:9
| |
LL | #![deny(if_let_rescope)] LL | #![deny(if_let_rescope)]
| ^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^

View file

@ -5,7 +5,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2024] compile-flags: -Zunstable-options
//@ [edition2024] check-pass //@ [edition2024] check-pass
#![deny(if_let_rescope)] #![deny(if_let_rescope)]

View file

@ -1,5 +1,5 @@
error[E0716]: temporary value dropped while borrowed error[E0716]: temporary value dropped while borrowed
--> $DIR/tail-expr-drop-order-negative.rs:9:15 --> $DIR/tail-expr-drop-order-negative.rs:8:15
| |
LL | x.replace(std::cell::RefCell::new(123).borrow()).is_some() LL | x.replace(std::cell::RefCell::new(123).borrow()).is_some()
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - temporary value is freed at the end of this statement | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - temporary value is freed at the end of this statement

View file

@ -1,5 +1,4 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2024] compile-flags: -Zunstable-options
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2021] check-pass //@ [edition2021] check-pass

View file

@ -2,7 +2,6 @@
// //
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
// //
//@[e2021] run-pass //@[e2021] run-pass
//@[e2021] run-rustfix //@[e2021] run-rustfix

View file

@ -1,5 +1,5 @@
warning: this function depends on never type fallback being `()` warning: this function depends on never type fallback being `()`
--> $DIR/never-type-fallback-breaking.rs:17:1 --> $DIR/never-type-fallback-breaking.rs:16:1
| |
LL | fn m() { LL | fn m() {
| ^^^^^^ | ^^^^^^
@ -8,7 +8,7 @@ LL | fn m() {
= note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748> = note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748>
= help: specify the types explicitly = help: specify the types explicitly
note: in edition 2024, the requirement `!: Default` will fail note: in edition 2024, the requirement `!: Default` will fail
--> $DIR/never-type-fallback-breaking.rs:21:17 --> $DIR/never-type-fallback-breaking.rs:20:17
| |
LL | true => Default::default(), LL | true => Default::default(),
| ^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^
@ -19,7 +19,7 @@ LL | let x: () = match true {
| ++++ | ++++
warning: this function depends on never type fallback being `()` warning: this function depends on never type fallback being `()`
--> $DIR/never-type-fallback-breaking.rs:29:1 --> $DIR/never-type-fallback-breaking.rs:28:1
| |
LL | fn q() -> Option<()> { LL | fn q() -> Option<()> {
| ^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^
@ -28,7 +28,7 @@ LL | fn q() -> Option<()> {
= note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748> = note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748>
= help: specify the types explicitly = help: specify the types explicitly
note: in edition 2024, the requirement `!: Default` will fail note: in edition 2024, the requirement `!: Default` will fail
--> $DIR/never-type-fallback-breaking.rs:36:5 --> $DIR/never-type-fallback-breaking.rs:35:5
| |
LL | deserialize()?; LL | deserialize()?;
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^
@ -38,7 +38,7 @@ LL | deserialize::<()>()?;
| ++++++ | ++++++
warning: this function depends on never type fallback being `()` warning: this function depends on never type fallback being `()`
--> $DIR/never-type-fallback-breaking.rs:46:1 --> $DIR/never-type-fallback-breaking.rs:45:1
| |
LL | fn meow() -> Result<(), ()> { LL | fn meow() -> Result<(), ()> {
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -47,7 +47,7 @@ LL | fn meow() -> Result<(), ()> {
= note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748> = note: for more information, see issue #123748 <https://github.com/rust-lang/rust/issues/123748>
= help: specify the types explicitly = help: specify the types explicitly
note: in edition 2024, the requirement `(): From<!>` will fail note: in edition 2024, the requirement `(): From<!>` will fail
--> $DIR/never-type-fallback-breaking.rs:49:5 --> $DIR/never-type-fallback-breaking.rs:48:5
| |
LL | help(1)?; LL | help(1)?;
| ^^^^^^^ | ^^^^^^^

View file

@ -1,5 +1,5 @@
error[E0277]: the trait bound `!: Default` is not satisfied error[E0277]: the trait bound `!: Default` is not satisfied
--> $DIR/never-type-fallback-breaking.rs:21:17 --> $DIR/never-type-fallback-breaking.rs:20:17
| |
LL | true => Default::default(), LL | true => Default::default(),
| ^^^^^^^^^^^^^^^^^^ the trait `Default` is not implemented for `!` | ^^^^^^^^^^^^^^^^^^ the trait `Default` is not implemented for `!`
@ -8,7 +8,7 @@ LL | true => Default::default(),
= help: did you intend to use the type `()` here instead? = help: did you intend to use the type `()` here instead?
error[E0277]: the trait bound `!: Default` is not satisfied error[E0277]: the trait bound `!: Default` is not satisfied
--> $DIR/never-type-fallback-breaking.rs:36:5 --> $DIR/never-type-fallback-breaking.rs:35:5
| |
LL | deserialize()?; LL | deserialize()?;
| ^^^^^^^^^^^^^ the trait `Default` is not implemented for `!` | ^^^^^^^^^^^^^ the trait `Default` is not implemented for `!`
@ -16,13 +16,13 @@ LL | deserialize()?;
= note: this error might have been caused by changes to Rust's type-inference algorithm (see issue #48950 <https://github.com/rust-lang/rust/issues/48950> for more information) = note: this error might have been caused by changes to Rust's type-inference algorithm (see issue #48950 <https://github.com/rust-lang/rust/issues/48950> for more information)
= help: did you intend to use the type `()` here instead? = help: did you intend to use the type `()` here instead?
note: required by a bound in `deserialize` note: required by a bound in `deserialize`
--> $DIR/never-type-fallback-breaking.rs:32:23 --> $DIR/never-type-fallback-breaking.rs:31:23
| |
LL | fn deserialize<T: Default>() -> Option<T> { LL | fn deserialize<T: Default>() -> Option<T> {
| ^^^^^^^ required by this bound in `deserialize` | ^^^^^^^ required by this bound in `deserialize`
error[E0277]: the trait bound `(): From<!>` is not satisfied error[E0277]: the trait bound `(): From<!>` is not satisfied
--> $DIR/never-type-fallback-breaking.rs:49:5 --> $DIR/never-type-fallback-breaking.rs:48:5
| |
LL | help(1)?; LL | help(1)?;
| ^^^^^^^ the trait `From<!>` is not implemented for `()` | ^^^^^^^ the trait `From<!>` is not implemented for `()`
@ -39,7 +39,7 @@ LL | help(1)?;
and 4 others and 4 others
= note: required for `!` to implement `Into<()>` = note: required for `!` to implement `Into<()>`
note: required by a bound in `help` note: required by a bound in `help`
--> $DIR/never-type-fallback-breaking.rs:43:20 --> $DIR/never-type-fallback-breaking.rs:42:20
| |
LL | fn help<'a: 'a, T: Into<()>, U>(_: U) -> Result<T, ()> { LL | fn help<'a: 'a, T: Into<()>, U>(_: U) -> Result<T, ()> {
| ^^^^^^^^ required by this bound in `help` | ^^^^^^^^ required by this bound in `help`

View file

@ -2,7 +2,6 @@
// //
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
// //
//@[e2021] run-pass //@[e2021] run-pass
//@[e2021] run-rustfix //@[e2021] run-rustfix

View file

@ -2,7 +2,6 @@
// //
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
// //
//@ run-pass //@ run-pass
//@ check-run-results //@ check-run-results

View file

@ -5,8 +5,6 @@
//@[e2021] edition:2021 //@[e2021] edition:2021
//@[e2024] edition:2024 //@[e2024] edition:2024
//@[e2024] compile-flags: -Zunstable-options
fn main() { fn main() {
println!("hello"); println!("hello");
} }

View file

@ -1,23 +1,23 @@
error: ['a: *, 'a: o] error: ['a: *, 'a: o]
--> $DIR/variance.rs:14:36 --> $DIR/variance.rs:13:36
| |
LL | fn not_captured_early<'a: 'a>() -> impl Sized {} LL | fn not_captured_early<'a: 'a>() -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: *, 'a: o] error: ['a: *, 'a: o]
--> $DIR/variance.rs:19:32 --> $DIR/variance.rs:18:32
| |
LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {} LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^
error: ['a: o] error: ['a: o]
--> $DIR/variance.rs:21:40 --> $DIR/variance.rs:20:40
| |
LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {} LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: o] error: ['a: o]
--> $DIR/variance.rs:26:36 --> $DIR/variance.rs:25:36
| |
LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {} LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,23 +1,23 @@
error: ['a: *, 'a: o] error: ['a: *, 'a: o]
--> $DIR/variance.rs:14:36 --> $DIR/variance.rs:13:36
| |
LL | fn not_captured_early<'a: 'a>() -> impl Sized {} LL | fn not_captured_early<'a: 'a>() -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: *, 'a: o] error: ['a: *, 'a: o]
--> $DIR/variance.rs:19:32 --> $DIR/variance.rs:18:32
| |
LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {} LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^
error: ['a: o] error: ['a: o]
--> $DIR/variance.rs:21:40 --> $DIR/variance.rs:20:40
| |
LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {} LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: o] error: ['a: o]
--> $DIR/variance.rs:26:36 --> $DIR/variance.rs:25:36
| |
LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {} LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,23 +1,23 @@
error: ['a: *] error: ['a: *]
--> $DIR/variance.rs:14:36 --> $DIR/variance.rs:13:36
| |
LL | fn not_captured_early<'a: 'a>() -> impl Sized {} LL | fn not_captured_early<'a: 'a>() -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: *, 'a: o] error: ['a: *, 'a: o]
--> $DIR/variance.rs:19:32 --> $DIR/variance.rs:18:32
| |
LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {} LL | fn captured_early<'a: 'a>() -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^
error: [] error: []
--> $DIR/variance.rs:21:40 --> $DIR/variance.rs:20:40
| |
LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {} LL | fn not_captured_late<'a>(_: &'a ()) -> impl Sized {}
| ^^^^^^^^^^ | ^^^^^^^^^^
error: ['a: o] error: ['a: o]
--> $DIR/variance.rs:26:36 --> $DIR/variance.rs:25:36
| |
LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {} LL | fn captured_late<'a>(_: &'a ()) -> impl Sized + Captures<'a> {}
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,6 +1,5 @@
//@ revisions: old new e2024 //@ revisions: old new e2024
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Z unstable-options
#![cfg_attr(new, feature(lifetime_capture_rules_2024))] #![cfg_attr(new, feature(lifetime_capture_rules_2024))]

View file

@ -1,5 +1,5 @@
error: lifetimes cannot use keyword names error: lifetimes cannot use keyword names
--> $DIR/gen-lt.rs:11:11 --> $DIR/gen-lt.rs:10:11
| |
LL | fn gen_lt<'gen>() {} LL | fn gen_lt<'gen>() {}
| ^^^^ | ^^^^

View file

@ -2,7 +2,6 @@
//@[e2021] edition:2021 //@[e2021] edition:2021
//@[e2024] edition:2024 //@[e2024] edition:2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2021] check-pass //@[e2021] check-pass

View file

@ -1,5 +1,5 @@
error[E0597]: `cell` does not live long enough error[E0597]: `cell` does not live long enough
--> $DIR/refcell-in-tail-expr.rs:10:27 --> $DIR/refcell-in-tail-expr.rs:9:27
| |
LL | let cell = std::cell::RefCell::new(0u8); LL | let cell = std::cell::RefCell::new(0u8);
| ---- binding `cell` declared here | ---- binding `cell` declared here

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2024] compile-flags: -Zunstable-options
//@ [edition2024] check-pass //@ [edition2024] check-pass
fn main() { fn main() {

View file

@ -1,5 +1,5 @@
error[E0597]: `c` does not live long enough error[E0597]: `c` does not live long enough
--> $DIR/shorter-tail-expr-lifetime.rs:8:5 --> $DIR/shorter-tail-expr-lifetime.rs:7:5
| |
LL | let c = std::cell::RefCell::new(".."); LL | let c = std::cell::RefCell::new("..");
| - binding `c` declared here | - binding `c` declared here

View file

@ -1,5 +1,4 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2024] compile-flags: -Zunstable-options
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2024] run-pass //@ [edition2024] run-pass

View file

@ -1,6 +1,5 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ ignore-wasm no panic or subprocess support //@ ignore-wasm no panic or subprocess support
//@ [edition2024] compile-flags: -Zunstable-options
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ run-pass //@ run-pass
//@ needs-unwind //@ needs-unwind

View file

@ -15,7 +15,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2024] compile-flags: -Z unstable-options
fn temp() -> (String, i32) { fn temp() -> (String, i32) {
(String::from("Hello"), 1) (String::from("Hello"), 1)

View file

@ -1,5 +1,5 @@
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:39:18 --> $DIR/static-mut-refs.rs:38:18
| |
LL | let _y = &X; LL | let _y = &X;
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -13,7 +13,7 @@ LL | let _y = &raw const X;
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a mutable reference to mutable static is discouraged warning: creating a mutable reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:43:18 --> $DIR/static-mut-refs.rs:42:18
| |
LL | let _y = &mut X; LL | let _y = &mut X;
| ^^^^^^ mutable reference to mutable static | ^^^^^^ mutable reference to mutable static
@ -26,7 +26,7 @@ LL | let _y = &raw mut X;
| ~~~~~~~~ | ~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:51:22 --> $DIR/static-mut-refs.rs:50:22
| |
LL | let ref _a = X; LL | let ref _a = X;
| ^ shared reference to mutable static | ^ shared reference to mutable static
@ -35,7 +35,7 @@ LL | let ref _a = X;
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:55:25 --> $DIR/static-mut-refs.rs:54:25
| |
LL | let (_b, _c) = (&X, &Y); LL | let (_b, _c) = (&X, &Y);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -48,7 +48,7 @@ LL | let (_b, _c) = (&raw const X, &Y);
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:55:29 --> $DIR/static-mut-refs.rs:54:29
| |
LL | let (_b, _c) = (&X, &Y); LL | let (_b, _c) = (&X, &Y);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -61,7 +61,7 @@ LL | let (_b, _c) = (&X, &raw const Y);
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:61:13 --> $DIR/static-mut-refs.rs:60:13
| |
LL | foo(&X); LL | foo(&X);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -74,7 +74,7 @@ LL | foo(&raw const X);
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:67:17 --> $DIR/static-mut-refs.rs:66:17
| |
LL | let _ = Z.len(); LL | let _ = Z.len();
| ^^^^^^^ shared reference to mutable static | ^^^^^^^ shared reference to mutable static
@ -83,7 +83,7 @@ LL | let _ = Z.len();
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:73:33 --> $DIR/static-mut-refs.rs:72:33
| |
LL | let _ = format!("{:?}", Z); LL | let _ = format!("{:?}", Z);
| ^ shared reference to mutable static | ^ shared reference to mutable static
@ -92,7 +92,7 @@ LL | let _ = format!("{:?}", Z);
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:77:18 --> $DIR/static-mut-refs.rs:76:18
| |
LL | let _v = &A.value; LL | let _v = &A.value;
| ^^^^^^^^ shared reference to mutable static | ^^^^^^^^ shared reference to mutable static
@ -105,7 +105,7 @@ LL | let _v = &raw const A.value;
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:81:18 --> $DIR/static-mut-refs.rs:80:18
| |
LL | let _s = &A.s.value; LL | let _s = &A.s.value;
| ^^^^^^^^^^ shared reference to mutable static | ^^^^^^^^^^ shared reference to mutable static
@ -118,7 +118,7 @@ LL | let _s = &raw const A.s.value;
| ~~~~~~~~~~ | ~~~~~~~~~~
warning: creating a shared reference to mutable static is discouraged warning: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:85:22 --> $DIR/static-mut-refs.rs:84:22
| |
LL | let ref _v = A.value; LL | let ref _v = A.value;
| ^^^^^^^ shared reference to mutable static | ^^^^^^^ shared reference to mutable static
@ -127,7 +127,7 @@ LL | let ref _v = A.value;
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
warning: creating a mutable reference to mutable static is discouraged warning: creating a mutable reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:15:14 --> $DIR/static-mut-refs.rs:14:14
| |
LL | &mut ($x.0) LL | &mut ($x.0)
| ^^^^^^ mutable reference to mutable static | ^^^^^^ mutable reference to mutable static

View file

@ -1,5 +1,5 @@
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:39:18 --> $DIR/static-mut-refs.rs:38:18
| |
LL | let _y = &X; LL | let _y = &X;
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -13,7 +13,7 @@ LL | let _y = &raw const X;
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a mutable reference to mutable static is discouraged error: creating a mutable reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:43:18 --> $DIR/static-mut-refs.rs:42:18
| |
LL | let _y = &mut X; LL | let _y = &mut X;
| ^^^^^^ mutable reference to mutable static | ^^^^^^ mutable reference to mutable static
@ -26,7 +26,7 @@ LL | let _y = &raw mut X;
| ~~~~~~~~ | ~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:51:22 --> $DIR/static-mut-refs.rs:50:22
| |
LL | let ref _a = X; LL | let ref _a = X;
| ^ shared reference to mutable static | ^ shared reference to mutable static
@ -35,7 +35,7 @@ LL | let ref _a = X;
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:55:25 --> $DIR/static-mut-refs.rs:54:25
| |
LL | let (_b, _c) = (&X, &Y); LL | let (_b, _c) = (&X, &Y);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -48,7 +48,7 @@ LL | let (_b, _c) = (&raw const X, &Y);
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:55:29 --> $DIR/static-mut-refs.rs:54:29
| |
LL | let (_b, _c) = (&X, &Y); LL | let (_b, _c) = (&X, &Y);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -61,7 +61,7 @@ LL | let (_b, _c) = (&X, &raw const Y);
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:61:13 --> $DIR/static-mut-refs.rs:60:13
| |
LL | foo(&X); LL | foo(&X);
| ^^ shared reference to mutable static | ^^ shared reference to mutable static
@ -74,7 +74,7 @@ LL | foo(&raw const X);
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:67:17 --> $DIR/static-mut-refs.rs:66:17
| |
LL | let _ = Z.len(); LL | let _ = Z.len();
| ^^^^^^^ shared reference to mutable static | ^^^^^^^ shared reference to mutable static
@ -83,7 +83,7 @@ LL | let _ = Z.len();
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:73:33 --> $DIR/static-mut-refs.rs:72:33
| |
LL | let _ = format!("{:?}", Z); LL | let _ = format!("{:?}", Z);
| ^ shared reference to mutable static | ^ shared reference to mutable static
@ -92,7 +92,7 @@ LL | let _ = format!("{:?}", Z);
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:77:18 --> $DIR/static-mut-refs.rs:76:18
| |
LL | let _v = &A.value; LL | let _v = &A.value;
| ^^^^^^^^ shared reference to mutable static | ^^^^^^^^ shared reference to mutable static
@ -105,7 +105,7 @@ LL | let _v = &raw const A.value;
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:81:18 --> $DIR/static-mut-refs.rs:80:18
| |
LL | let _s = &A.s.value; LL | let _s = &A.s.value;
| ^^^^^^^^^^ shared reference to mutable static | ^^^^^^^^^^ shared reference to mutable static
@ -118,7 +118,7 @@ LL | let _s = &raw const A.s.value;
| ~~~~~~~~~~ | ~~~~~~~~~~
error: creating a shared reference to mutable static is discouraged error: creating a shared reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:85:22 --> $DIR/static-mut-refs.rs:84:22
| |
LL | let ref _v = A.value; LL | let ref _v = A.value;
| ^^^^^^^ shared reference to mutable static | ^^^^^^^ shared reference to mutable static
@ -127,7 +127,7 @@ LL | let ref _v = A.value;
= note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
error: creating a mutable reference to mutable static is discouraged error: creating a mutable reference to mutable static is discouraged
--> $DIR/static-mut-refs.rs:15:14 --> $DIR/static-mut-refs.rs:14:14
| |
LL | &mut ($x.0) LL | &mut ($x.0)
| ^^^^^^ mutable reference to mutable static | ^^^^^^ mutable reference to mutable static

View file

@ -6,7 +6,6 @@
//@ [e2021] run-pass //@ [e2021] run-pass
//@ [e2024] edition:2024 //@ [e2024] edition:2024
//@ [e2024] compile-flags: -Zunstable-options
static mut FOO: (u32, u32) = (1, 2); static mut FOO: (u32, u32) = (1, 2);

View file

@ -1,11 +1,11 @@
error: missing fragment specifier error: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:9:20 --> $DIR/macro-missing-fragment.rs:8:20
| |
LL | ( $( any_token $field_rust_type )* ) => {}; LL | ( $( any_token $field_rust_type )* ) => {};
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:9:20 --> $DIR/macro-missing-fragment.rs:8:20
| |
LL | ( $( any_token $field_rust_type )* ) => {}; LL | ( $( any_token $field_rust_type )* ) => {};
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^
@ -13,13 +13,13 @@ LL | ( $( any_token $field_rust_type )* ) => {};
= warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release!
= note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107> = note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/macro-missing-fragment.rs:6:9 --> $DIR/macro-missing-fragment.rs:5:9
| |
LL | #![warn(missing_fragment_specifier)] LL | #![warn(missing_fragment_specifier)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:19:7 --> $DIR/macro-missing-fragment.rs:18:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -28,7 +28,7 @@ LL | ( $name ) => {};
= note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107> = note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107>
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:26:7 --> $DIR/macro-missing-fragment.rs:25:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -40,7 +40,7 @@ error: aborting due to 1 previous error; 3 warnings emitted
Future incompatibility report: Future breakage diagnostic: Future incompatibility report: Future breakage diagnostic:
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:9:20 --> $DIR/macro-missing-fragment.rs:8:20
| |
LL | ( $( any_token $field_rust_type )* ) => {}; LL | ( $( any_token $field_rust_type )* ) => {};
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^
@ -48,14 +48,14 @@ LL | ( $( any_token $field_rust_type )* ) => {};
= warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release!
= note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107> = note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/macro-missing-fragment.rs:6:9 --> $DIR/macro-missing-fragment.rs:5:9
| |
LL | #![warn(missing_fragment_specifier)] LL | #![warn(missing_fragment_specifier)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^
Future breakage diagnostic: Future breakage diagnostic:
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:19:7 --> $DIR/macro-missing-fragment.rs:18:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -63,14 +63,14 @@ LL | ( $name ) => {};
= warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release!
= note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107> = note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/macro-missing-fragment.rs:6:9 --> $DIR/macro-missing-fragment.rs:5:9
| |
LL | #![warn(missing_fragment_specifier)] LL | #![warn(missing_fragment_specifier)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^
Future breakage diagnostic: Future breakage diagnostic:
warning: missing fragment specifier warning: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:26:7 --> $DIR/macro-missing-fragment.rs:25:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -78,7 +78,7 @@ LL | ( $name ) => {};
= warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release!
= note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107> = note: for more information, see issue #40107 <https://github.com/rust-lang/rust/issues/40107>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/macro-missing-fragment.rs:6:9 --> $DIR/macro-missing-fragment.rs:5:9
| |
LL | #![warn(missing_fragment_specifier)] LL | #![warn(missing_fragment_specifier)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,5 +1,5 @@
error: missing fragment specifier error: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:9:20 --> $DIR/macro-missing-fragment.rs:8:20
| |
LL | ( $( any_token $field_rust_type )* ) => {}; LL | ( $( any_token $field_rust_type )* ) => {};
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^
@ -12,7 +12,7 @@ LL | ( $( any_token $field_rust_type:spec )* ) => {};
| +++++ | +++++
error: missing fragment specifier error: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:19:7 --> $DIR/macro-missing-fragment.rs:18:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -25,7 +25,7 @@ LL | ( $name:spec ) => {};
| +++++ | +++++
error: missing fragment specifier error: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:26:7 --> $DIR/macro-missing-fragment.rs:25:7
| |
LL | ( $name ) => {}; LL | ( $name ) => {};
| ^^^^^ | ^^^^^
@ -38,7 +38,7 @@ LL | ( $name:spec ) => {};
| +++++ | +++++
error: missing fragment specifier error: missing fragment specifier
--> $DIR/macro-missing-fragment.rs:9:20 --> $DIR/macro-missing-fragment.rs:8:20
| |
LL | ( $( any_token $field_rust_type )* ) => {}; LL | ( $( any_token $field_rust_type )* ) => {};
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^

View file

@ -1,7 +1,6 @@
//@ revisions: e2015 e2024 //@ revisions: e2015 e2024
//@[e2015] edition:2015 //@[e2015] edition:2015
//@[e2024] edition:2024 //@[e2024] edition:2024
//@[e2024] compile-flags: -Zunstable-options
#![warn(missing_fragment_specifier)] #![warn(missing_fragment_specifier)]

View file

@ -2,7 +2,6 @@
//@ needs-unwind //@ needs-unwind
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] compile-flags: -Z unstable-options
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
// See `mir_drop_order.rs` for more information // See `mir_drop_order.rs` for more information

View file

@ -1,5 +1,5 @@
warning: never type fallback affects this call to an `unsafe` function warning: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:13:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:12:18
| |
LL | unsafe { mem::zeroed() } LL | unsafe { mem::zeroed() }
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^
@ -14,7 +14,7 @@ LL | unsafe { mem::zeroed::<()>() }
| ++++++ | ++++++
warning: never type fallback affects this call to an `unsafe` function warning: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:30:13 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:29:13
| |
LL | core::mem::transmute(Zst) LL | core::mem::transmute(Zst)
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^
@ -28,7 +28,7 @@ LL | core::mem::transmute::<_, ()>(Zst)
| +++++++++ | +++++++++
warning: never type fallback affects this union access warning: never type fallback affects this union access
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:47:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:46:18
| |
LL | unsafe { Union { a: () }.b } LL | unsafe { Union { a: () }.b }
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^
@ -38,7 +38,7 @@ LL | unsafe { Union { a: () }.b }
= help: specify the type explicitly = help: specify the type explicitly
warning: never type fallback affects this raw pointer dereference warning: never type fallback affects this raw pointer dereference
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:58:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:57:18
| |
LL | unsafe { *ptr::from_ref(&()).cast() } LL | unsafe { *ptr::from_ref(&()).cast() }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -52,7 +52,7 @@ LL | unsafe { *ptr::from_ref(&()).cast::<()>() }
| ++++++ | ++++++
warning: never type fallback affects this call to an `unsafe` function warning: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:79:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:78:18
| |
LL | unsafe { internally_create(x) } LL | unsafe { internally_create(x) }
| ^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^
@ -66,7 +66,7 @@ LL | unsafe { internally_create::<()>(x) }
| ++++++ | ++++++
warning: never type fallback affects this call to an `unsafe` function warning: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:97:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:96:18
| |
LL | unsafe { zeroed() } LL | unsafe { zeroed() }
| ^^^^^^^^ | ^^^^^^^^
@ -80,7 +80,7 @@ LL | let zeroed = mem::zeroed::<()>;
| ++++++ | ++++++
warning: never type fallback affects this `unsafe` function warning: never type fallback affects this `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:92:22 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:91:22
| |
LL | let zeroed = mem::zeroed; LL | let zeroed = mem::zeroed;
| ^^^^^^^^^^^ | ^^^^^^^^^^^
@ -94,7 +94,7 @@ LL | let zeroed = mem::zeroed::<()>;
| ++++++ | ++++++
warning: never type fallback affects this `unsafe` function warning: never type fallback affects this `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:115:17 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:114:17
| |
LL | let f = internally_create; LL | let f = internally_create;
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^
@ -108,7 +108,7 @@ LL | let f = internally_create::<()>;
| ++++++ | ++++++
warning: never type fallback affects this call to an `unsafe` method warning: never type fallback affects this call to an `unsafe` method
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:140:13 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:139:13
| |
LL | S(marker::PhantomData).create_out_of_thin_air() LL | S(marker::PhantomData).create_out_of_thin_air()
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -118,7 +118,7 @@ LL | S(marker::PhantomData).create_out_of_thin_air()
= help: specify the type explicitly = help: specify the type explicitly
warning: never type fallback affects this call to an `unsafe` function warning: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:158:19 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:157:19
| |
LL | match send_message::<_ /* ?0 */>() { LL | match send_message::<_ /* ?0 */>() {
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,5 +1,5 @@
error: never type fallback affects this call to an `unsafe` function error: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:13:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:12:18
| |
LL | unsafe { mem::zeroed() } LL | unsafe { mem::zeroed() }
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^
@ -14,7 +14,7 @@ LL | unsafe { mem::zeroed::<()>() }
| ++++++ | ++++++
error: never type fallback affects this call to an `unsafe` function error: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:30:13 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:29:13
| |
LL | core::mem::transmute(Zst) LL | core::mem::transmute(Zst)
| ^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^
@ -28,7 +28,7 @@ LL | core::mem::transmute::<_, ()>(Zst)
| +++++++++ | +++++++++
error: never type fallback affects this union access error: never type fallback affects this union access
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:47:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:46:18
| |
LL | unsafe { Union { a: () }.b } LL | unsafe { Union { a: () }.b }
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^
@ -38,7 +38,7 @@ LL | unsafe { Union { a: () }.b }
= help: specify the type explicitly = help: specify the type explicitly
error: never type fallback affects this raw pointer dereference error: never type fallback affects this raw pointer dereference
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:58:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:57:18
| |
LL | unsafe { *ptr::from_ref(&()).cast() } LL | unsafe { *ptr::from_ref(&()).cast() }
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -52,7 +52,7 @@ LL | unsafe { *ptr::from_ref(&()).cast::<()>() }
| ++++++ | ++++++
error: never type fallback affects this call to an `unsafe` function error: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:79:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:78:18
| |
LL | unsafe { internally_create(x) } LL | unsafe { internally_create(x) }
| ^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^
@ -66,7 +66,7 @@ LL | unsafe { internally_create::<()>(x) }
| ++++++ | ++++++
error: never type fallback affects this call to an `unsafe` function error: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:97:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:96:18
| |
LL | unsafe { zeroed() } LL | unsafe { zeroed() }
| ^^^^^^^^ | ^^^^^^^^
@ -80,7 +80,7 @@ LL | let zeroed = mem::zeroed::<()>;
| ++++++ | ++++++
error: never type fallback affects this `unsafe` function error: never type fallback affects this `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:92:22 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:91:22
| |
LL | let zeroed = mem::zeroed; LL | let zeroed = mem::zeroed;
| ^^^^^^^^^^^ | ^^^^^^^^^^^
@ -94,7 +94,7 @@ LL | let zeroed = mem::zeroed::<()>;
| ++++++ | ++++++
error: never type fallback affects this `unsafe` function error: never type fallback affects this `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:115:17 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:114:17
| |
LL | let f = internally_create; LL | let f = internally_create;
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^
@ -108,7 +108,7 @@ LL | let f = internally_create::<()>;
| ++++++ | ++++++
error: never type fallback affects this call to an `unsafe` method error: never type fallback affects this call to an `unsafe` method
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:140:13 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:139:13
| |
LL | S(marker::PhantomData).create_out_of_thin_air() LL | S(marker::PhantomData).create_out_of_thin_air()
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -118,7 +118,7 @@ LL | S(marker::PhantomData).create_out_of_thin_air()
= help: specify the type explicitly = help: specify the type explicitly
error: never type fallback affects this call to an `unsafe` function error: never type fallback affects this call to an `unsafe` function
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:158:19 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:157:19
| |
LL | match send_message::<_ /* ?0 */>() { LL | match send_message::<_ /* ?0 */>() {
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
@ -136,7 +136,7 @@ LL | match send_message::<() /* ?0 */>() {
| ~~ | ~~
warning: the type `!` does not permit zero-initialization warning: the type `!` does not permit zero-initialization
--> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:13:18 --> $DIR/lint-never-type-fallback-flowing-into-unsafe.rs:12:18
| |
LL | unsafe { mem::zeroed() } LL | unsafe { mem::zeroed() }
| ^^^^^^^^^^^^^ this code causes undefined behavior when executed | ^^^^^^^^^^^^^ this code causes undefined behavior when executed

View file

@ -2,7 +2,6 @@
//@[e2015] check-pass //@[e2015] check-pass
//@[e2024] check-fail //@[e2024] check-fail
//@[e2024] edition:2024 //@[e2024] edition:2024
//@[e2024] compile-flags: -Zunstable-options
use std::{marker, mem, ptr}; use std::{marker, mem, ptr};

View file

@ -1,5 +1,5 @@
error[E0597]: `counter` does not live long enough error[E0597]: `counter` does not live long enough
--> $DIR/issue-54556-niconii.rs:28:20 --> $DIR/issue-54556-niconii.rs:27:20
| |
LL | let counter = Mutex; LL | let counter = Mutex;
| ------- binding `counter` declared here | ------- binding `counter` declared here

View file

@ -9,7 +9,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@ [edition2021] edition: 2021 //@ [edition2021] edition: 2021
//@ [edition2024] edition: 2024 //@ [edition2024] edition: 2024
//@ [edition2024] compile-flags: -Z unstable-options
//@ [edition2024] check-pass //@ [edition2024] check-pass
struct Mutex; struct Mutex;

View file

@ -6,7 +6,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass
// This checks how the expr fragment specifier works. // This checks how the expr fragment specifier works.

View file

@ -1,7 +1,6 @@
//@ revisions: e2021 e2024 //@ revisions: e2021 e2024
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,5 +1,5 @@
error: trait method `poll` will become ambiguous in Rust 2024 error: trait method `poll` will become ambiguous in Rust 2024
--> $DIR/future-poll-async-block.rs:14:5 --> $DIR/future-poll-async-block.rs:13:5
| |
LL | core::pin::pin!(async {}).poll(&mut context()); LL | core::pin::pin!(async {}).poll(&mut context());
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::poll(&core::pin::pin!(async {}), &mut context())` | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::poll(&core::pin::pin!(async {}), &mut context())`
@ -7,7 +7,7 @@ LL | core::pin::pin!(async {}).poll(&mut context());
= warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024!
= note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html> = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/future-poll-async-block.rs:8:9 --> $DIR/future-poll-async-block.rs:7:9
| |
LL | #![deny(rust_2024_prelude_collisions)] LL | #![deny(rust_2024_prelude_collisions)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,5 +1,5 @@
error: trait method `poll` will become ambiguous in Rust 2024 error: trait method `poll` will become ambiguous in Rust 2024
--> $DIR/future-poll-not-future-pinned.rs:18:5 --> $DIR/future-poll-not-future-pinned.rs:17:5
| |
LL | core::pin::pin!(()).poll(); LL | core::pin::pin!(()).poll();
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::poll(&core::pin::pin!(()))` | ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::poll(&core::pin::pin!(()))`
@ -7,7 +7,7 @@ LL | core::pin::pin!(()).poll();
= warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024!
= note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html> = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/future-poll-not-future-pinned.rs:8:9 --> $DIR/future-poll-not-future-pinned.rs:7:9
| |
LL | #![deny(rust_2024_prelude_collisions)] LL | #![deny(rust_2024_prelude_collisions)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,7 +1,6 @@
//@ revisions: e2021 e2024 //@ revisions: e2021 e2024
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,5 +1,5 @@
error: trait method `into_future` will become ambiguous in Rust 2024 error: trait method `into_future` will become ambiguous in Rust 2024
--> $DIR/into-future-adt.rs:26:5 --> $DIR/into-future-adt.rs:25:5
| |
LL | Cat.into_future(); LL | Cat.into_future();
| ^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::into_future(&Cat)` | ^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::into_future(&Cat)`
@ -7,7 +7,7 @@ LL | Cat.into_future();
= warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024!
= note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html> = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/into-future-adt.rs:8:9 --> $DIR/into-future-adt.rs:7:9
| |
LL | #![deny(rust_2024_prelude_collisions)] LL | #![deny(rust_2024_prelude_collisions)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,7 +1,6 @@
//@ revisions: e2021 e2024 //@ revisions: e2021 e2024
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,5 +1,5 @@
error: trait method `into_future` will become ambiguous in Rust 2024 error: trait method `into_future` will become ambiguous in Rust 2024
--> $DIR/into-future-not-into-future.rs:20:5 --> $DIR/into-future-not-into-future.rs:19:5
| |
LL | Cat.into_future(); LL | Cat.into_future();
| ^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::into_future(&Cat)` | ^^^^^^^^^^^^^^^^^ help: disambiguate the associated function: `Meow::into_future(&Cat)`
@ -7,7 +7,7 @@ LL | Cat.into_future();
= warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024! = warning: this is accepted in the current edition (Rust 2021) but is a hard error in Rust 2024!
= note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html> = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/prelude.html>
note: the lint level is defined here note: the lint level is defined here
--> $DIR/into-future-not-into-future.rs:8:9 --> $DIR/into-future-not-into-future.rs:7:9
| |
LL | #![deny(rust_2024_prelude_collisions)] LL | #![deny(rust_2024_prelude_collisions)]
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^

View file

@ -2,7 +2,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] run-rustfix //@[e2021] run-rustfix
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
//@[e2024] check-pass //@[e2024] check-pass
#![deny(rust_2024_prelude_collisions)] #![deny(rust_2024_prelude_collisions)]

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass

View file

@ -5,7 +5,6 @@
//@ check-pass //@ check-pass
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
//@ proc-macro: unsafe-attributes-pm.rs //@ proc-macro: unsafe-attributes-pm.rs
unsafe_attributes_pm::missing_unsafe!(); unsafe_attributes_pm::missing_unsafe!();

View file

@ -1,5 +1,5 @@
error: unsafe attribute used without unsafe error: unsafe attribute used without unsafe
--> $DIR/unsafe-attributes.rs:8:3 --> $DIR/unsafe-attributes.rs:7:3
| |
LL | #[no_mangle] LL | #[no_mangle]
| ^^^^^^^^^ usage of unsafe attribute | ^^^^^^^^^ usage of unsafe attribute

View file

@ -2,7 +2,6 @@
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2021] check-pass //@[edition2021] check-pass
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
#[no_mangle] //[edition2024]~ ERROR: unsafe attribute used without unsafe #[no_mangle] //[edition2024]~ ERROR: unsafe attribute used without unsafe

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `before_exec` is unsafe and requires unsafe block error[E0133]: call to unsafe function `before_exec` is unsafe and requires unsafe block
--> $DIR/unsafe-before_exec.rs:14:5 --> $DIR/unsafe-before_exec.rs:13:5
| |
LL | cmd.before_exec(|| Ok(())); LL | cmd.before_exec(|| Ok(()));
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function

View file

@ -3,7 +3,6 @@
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2021] check-pass //@[e2021] check-pass
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
use std::process::Command; use std::process::Command;
use std::os::unix::process::CommandExt; use std::os::unix::process::CommandExt;

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:15:9 --> $DIR/unsafe-env.rs:14:9
| |
LL | unsafe_fn(); LL | unsafe_fn();
| ^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^ call to unsafe function
@ -7,18 +7,18 @@ LL | unsafe_fn();
= note: for more information, see issue #71668 <https://github.com/rust-lang/rust/issues/71668> = note: for more information, see issue #71668 <https://github.com/rust-lang/rust/issues/71668>
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
note: an unsafe function restricts its caller, but its body is safe by default note: an unsafe function restricts its caller, but its body is safe by default
--> $DIR/unsafe-env.rs:9:1 --> $DIR/unsafe-env.rs:8:1
| |
LL | unsafe fn unsafe_fn() { LL | unsafe fn unsafe_fn() {
| ^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^
note: the lint level is defined here note: the lint level is defined here
--> $DIR/unsafe-env.rs:8:8 --> $DIR/unsafe-env.rs:7:8
| |
LL | #[deny(unsafe_op_in_unsafe_fn)] LL | #[deny(unsafe_op_in_unsafe_fn)]
| ^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^
error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe function or block error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe function or block
--> $DIR/unsafe-env.rs:33:5 --> $DIR/unsafe-env.rs:32:5
| |
LL | unsafe_fn(); LL | unsafe_fn();
| ^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^ call to unsafe function
@ -26,13 +26,13 @@ LL | unsafe_fn();
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error: unnecessary `unsafe` block error: unnecessary `unsafe` block
--> $DIR/unsafe-env.rs:36:5 --> $DIR/unsafe-env.rs:35:5
| |
LL | unsafe { LL | unsafe {
| ^^^^^^ unnecessary `unsafe` block | ^^^^^^ unnecessary `unsafe` block
| |
note: the lint level is defined here note: the lint level is defined here
--> $DIR/unsafe-env.rs:21:8 --> $DIR/unsafe-env.rs:20:8
| |
LL | #[deny(unused_unsafe)] LL | #[deny(unused_unsafe)]
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `std::env::set_var` is unsafe and requires unsafe block error[E0133]: call to unsafe function `std::env::set_var` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:10:5 --> $DIR/unsafe-env.rs:9:5
| |
LL | env::set_var("FOO", "BAR"); LL | env::set_var("FOO", "BAR");
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
@ -7,18 +7,18 @@ LL | env::set_var("FOO", "BAR");
= note: for more information, see issue #71668 <https://github.com/rust-lang/rust/issues/71668> = note: for more information, see issue #71668 <https://github.com/rust-lang/rust/issues/71668>
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
note: an unsafe function restricts its caller, but its body is safe by default note: an unsafe function restricts its caller, but its body is safe by default
--> $DIR/unsafe-env.rs:9:1 --> $DIR/unsafe-env.rs:8:1
| |
LL | unsafe fn unsafe_fn() { LL | unsafe fn unsafe_fn() {
| ^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^
note: the lint level is defined here note: the lint level is defined here
--> $DIR/unsafe-env.rs:8:8 --> $DIR/unsafe-env.rs:7:8
| |
LL | #[deny(unsafe_op_in_unsafe_fn)] LL | #[deny(unsafe_op_in_unsafe_fn)]
| ^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^
error[E0133]: call to unsafe function `std::env::remove_var` is unsafe and requires unsafe block error[E0133]: call to unsafe function `std::env::remove_var` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:12:5 --> $DIR/unsafe-env.rs:11:5
| |
LL | env::remove_var("FOO"); LL | env::remove_var("FOO");
| ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
@ -27,7 +27,7 @@ LL | env::remove_var("FOO");
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:15:9 --> $DIR/unsafe-env.rs:14:9
| |
LL | unsafe_fn(); LL | unsafe_fn();
| ^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^ call to unsafe function
@ -36,7 +36,7 @@ LL | unsafe_fn();
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block error[E0133]: call to unsafe function `set_var` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:23:5 --> $DIR/unsafe-env.rs:22:5
| |
LL | env::set_var("FOO", "BAR"); LL | env::set_var("FOO", "BAR");
| ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
@ -44,7 +44,7 @@ LL | env::set_var("FOO", "BAR");
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: call to unsafe function `remove_var` is unsafe and requires unsafe block error[E0133]: call to unsafe function `remove_var` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:25:5 --> $DIR/unsafe-env.rs:24:5
| |
LL | env::remove_var("FOO"); LL | env::remove_var("FOO");
| ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
@ -52,7 +52,7 @@ LL | env::remove_var("FOO");
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block error[E0133]: call to unsafe function `unsafe_fn` is unsafe and requires unsafe block
--> $DIR/unsafe-env.rs:33:5 --> $DIR/unsafe-env.rs:32:5
| |
LL | unsafe_fn(); LL | unsafe_fn();
| ^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^ call to unsafe function
@ -60,13 +60,13 @@ LL | unsafe_fn();
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error: unnecessary `unsafe` block error: unnecessary `unsafe` block
--> $DIR/unsafe-env.rs:36:5 --> $DIR/unsafe-env.rs:35:5
| |
LL | unsafe { LL | unsafe {
| ^^^^^^ unnecessary `unsafe` block | ^^^^^^ unnecessary `unsafe` block
| |
note: the lint level is defined here note: the lint level is defined here
--> $DIR/unsafe-env.rs:21:8 --> $DIR/unsafe-env.rs:20:8
| |
LL | #[deny(unused_unsafe)] LL | #[deny(unused_unsafe)]
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^

View file

@ -1,7 +1,6 @@
//@ revisions: e2021 e2024 //@ revisions: e2021 e2024
//@[e2021] edition: 2021 //@[e2021] edition: 2021
//@[e2024] edition: 2024 //@[e2024] edition: 2024
//@[e2024] compile-flags: -Zunstable-options
use std::env; use std::env;

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe function or block error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe function or block
--> $DIR/extern-items-unsafe.rs:12:5 --> $DIR/extern-items-unsafe.rs:11:5
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^ call to unsafe function
@ -7,7 +7,7 @@ LL | test1(TEST1);
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: use of extern static is unsafe and requires unsafe function or block error[E0133]: use of extern static is unsafe and requires unsafe function or block
--> $DIR/extern-items-unsafe.rs:12:11 --> $DIR/extern-items-unsafe.rs:11:11
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^ use of extern static | ^^^^^ use of extern static

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe block error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe block
--> $DIR/extern-items-unsafe.rs:12:5 --> $DIR/extern-items-unsafe.rs:11:5
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^ call to unsafe function
@ -7,7 +7,7 @@ LL | test1(TEST1);
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: use of extern static is unsafe and requires unsafe block error[E0133]: use of extern static is unsafe and requires unsafe block
--> $DIR/extern-items-unsafe.rs:12:11 --> $DIR/extern-items-unsafe.rs:11:11
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^ use of extern static | ^^^^^ use of extern static

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
unsafe extern "C" { unsafe extern "C" {
static TEST1: i32; static TEST1: i32;

View file

@ -1,5 +1,5 @@
error: extern blocks must be unsafe error: extern blocks must be unsafe
--> $DIR/extern-items.rs:7:1 --> $DIR/extern-items.rs:6:1
| |
LL | / extern "C" { LL | / extern "C" {
LL | | LL | |

View file

@ -2,7 +2,6 @@
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2021] check-pass //@[edition2021] check-pass
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
extern "C" { extern "C" {
//[edition2024]~^ ERROR extern blocks must be unsafe //[edition2024]~^ ERROR extern blocks must be unsafe

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
//@ check-pass //@ check-pass
unsafe extern "C" { unsafe extern "C" {

View file

@ -1,5 +1,5 @@
error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers
--> $DIR/safe-unsafe-on-unadorned-extern-block.rs:8:5 --> $DIR/safe-unsafe-on-unadorned-extern-block.rs:7:5
| |
LL | safe static TEST1: i32; LL | safe static TEST1: i32;
| ^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^
@ -10,7 +10,7 @@ LL | unsafe extern "C" {
| ++++++ | ++++++
error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers
--> $DIR/safe-unsafe-on-unadorned-extern-block.rs:10:5 --> $DIR/safe-unsafe-on-unadorned-extern-block.rs:9:5
| |
LL | safe fn test1(i: i32); LL | safe fn test1(i: i32);
| ^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,5 +1,5 @@
error: extern blocks must be unsafe error: extern blocks must be unsafe
--> $DIR/safe-unsafe-on-unadorned-extern-block.rs:6:1 --> $DIR/safe-unsafe-on-unadorned-extern-block.rs:5:1
| |
LL | / extern "C" { LL | / extern "C" {
LL | | LL | |
@ -11,7 +11,7 @@ LL | | }
| |_^ | |_^
error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers
--> $DIR/safe-unsafe-on-unadorned-extern-block.rs:8:5 --> $DIR/safe-unsafe-on-unadorned-extern-block.rs:7:5
| |
LL | safe static TEST1: i32; LL | safe static TEST1: i32;
| ^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^
@ -22,7 +22,7 @@ LL | unsafe extern "C" {
| ++++++ | ++++++
error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers error: items in `extern` blocks without an `unsafe` qualifier cannot have safety qualifiers
--> $DIR/safe-unsafe-on-unadorned-extern-block.rs:10:5 --> $DIR/safe-unsafe-on-unadorned-extern-block.rs:9:5
| |
LL | safe fn test1(i: i32); LL | safe fn test1(i: i32);
| ^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
extern "C" { extern "C" {
//[edition2024]~^ ERROR extern blocks must be unsafe //[edition2024]~^ ERROR extern blocks must be unsafe

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe function or block error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe function or block
--> $DIR/unsafe-items.rs:18:5 --> $DIR/unsafe-items.rs:17:5
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^ call to unsafe function
@ -7,7 +7,7 @@ LL | test1(TEST1);
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: use of extern static is unsafe and requires unsafe function or block error[E0133]: use of extern static is unsafe and requires unsafe function or block
--> $DIR/unsafe-items.rs:18:11 --> $DIR/unsafe-items.rs:17:11
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^ use of extern static | ^^^^^ use of extern static

View file

@ -1,5 +1,5 @@
error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe block error[E0133]: call to unsafe function `test1` is unsafe and requires unsafe block
--> $DIR/unsafe-items.rs:18:5 --> $DIR/unsafe-items.rs:17:5
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^^^^^^^^ call to unsafe function | ^^^^^^^^^^^^ call to unsafe function
@ -7,7 +7,7 @@ LL | test1(TEST1);
= note: consult the function's documentation for information on how to avoid undefined behavior = note: consult the function's documentation for information on how to avoid undefined behavior
error[E0133]: use of extern static is unsafe and requires unsafe block error[E0133]: use of extern static is unsafe and requires unsafe block
--> $DIR/unsafe-items.rs:18:11 --> $DIR/unsafe-items.rs:17:11
| |
LL | test1(TEST1); LL | test1(TEST1);
| ^^^^^ use of extern static | ^^^^^ use of extern static

View file

@ -1,7 +1,6 @@
//@ revisions: edition2021 edition2024 //@ revisions: edition2021 edition2024
//@[edition2021] edition:2021 //@[edition2021] edition:2021
//@[edition2024] edition:2024 //@[edition2024] edition:2024
//@[edition2024] compile-flags: -Zunstable-options
unsafe extern "C" { unsafe extern "C" {
unsafe static TEST1: i32; unsafe static TEST1: i32;