[INFO] fetching crate lv-std 0.0.4...
[INFO] checking lv-std-0.0.4 against try#7b3da9103634dffd4f4365cfd8642427c781d99f+rustflags=-Dinherent-method-on-receiver for 152214-denied-retry-0
[INFO] extracting crate lv-std 0.0.4 into /workspace/builds/worker-5-tc2/source
[INFO] started tweaking crates.io crate lv-std 0.0.4
[INFO] finished tweaking crates.io crate lv-std 0.0.4
[INFO] tweaked toml for crates.io crate lv-std 0.0.4 written to /workspace/builds/worker-5-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate lv-std 0.0.4 on toolchain 7b3da9103634dffd4f4365cfd8642427c781d99f
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate lv-std 0.0.4 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 7d1aaa0a117f955f4c4c1460ebbcb149801a166325541248488decda5338196c
[INFO] running `Command { std: "docker" "start" "-a" "7d1aaa0a117f955f4c4c1460ebbcb149801a166325541248488decda5338196c", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "7d1aaa0a117f955f4c4c1460ebbcb149801a166325541248488decda5338196c", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "7d1aaa0a117f955f4c4c1460ebbcb149801a166325541248488decda5338196c", kill_on_drop: false }`
[INFO] [stdout] 7d1aaa0a117f955f4c4c1460ebbcb149801a166325541248488decda5338196c
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dinherent-method-on-receiver" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 70ee985ce790b5a5284b8387b259bbfe5ec18de021d2f9257e2bbec368dcce7d
[INFO] running `Command { std: "docker" "start" "-a" "70ee985ce790b5a5284b8387b259bbfe5ec18de021d2f9257e2bbec368dcce7d", kill_on_drop: false }`
[INFO] [stderr]    Compiling typenum v1.18.0
[INFO] [stderr]     Checking generic-array v1.2.0
[INFO] [stderr]     Checking lv-std v0.0.4 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `ManuallyDrop`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:3:27
[INFO] [stdout]   |
[INFO] [stdout] 3 | use std::mem::{transmute, ManuallyDrop};
[INFO] [stdout]   |                           ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `crate::unsafe_std::ptrs::raw_ptr::RawPtr`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:6:5
[INFO] [stdout]   |
[INFO] [stdout] 6 | use crate::unsafe_std::ptrs::raw_ptr::RawPtr;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `ManuallyDrop`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:3:27
[INFO] [stdout]   |
[INFO] [stdout] 3 | use std::mem::{transmute, ManuallyDrop};
[INFO] [stdout]   |                           ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `crate::unsafe_std::ptrs::raw_ptr::RawPtr`
[INFO] [stdout]  --> src/unsafe_std/ptrs/unsafe_shared.rs:6:5
[INFO] [stdout]   |
[INFO] [stdout] 6 | use crate::unsafe_std::ptrs::raw_ptr::RawPtr;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: this `#[deprecated]` annotation has no effect
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:255:5
[INFO] [stdout]     |
[INFO] [stdout] 255 |     #[deprecated (since = "0.0.0", note = "this is a blanket impl to allow the copy trait, please refer to the rclone method instead")]
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: remove the unnecessary deprecation attribute
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_attributes)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: this `#[deprecated]` annotation has no effect
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:255:5
[INFO] [stdout]     |
[INFO] [stdout] 255 |     #[deprecated (since = "0.0.0", note = "this is a blanket impl to allow the copy trait, please refer to the rclone method instead")]
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: remove the unnecessary deprecation attribute
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_attributes)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:37:10
[INFO] [stdout]    |
[INFO] [stdout] 37 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:36:5
[INFO] [stdout]    |
[INFO] [stdout] 36 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:37:11
[INFO] [stdout]    |
[INFO] [stdout] 37 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:14
[INFO] [stdout]    |
[INFO] [stdout] 42 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:15
[INFO] [stdout]    |
[INFO] [stdout] 42 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:9
[INFO] [stdout]    |
[INFO] [stdout] 47 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:46:5
[INFO] [stdout]    |
[INFO] [stdout] 46 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:9
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:51:5
[INFO] [stdout]    |
[INFO] [stdout] 51 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 52 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:39
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:39
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:9
[INFO] [stdout]    |
[INFO] [stdout] 59 |         *self.ptr = value;
[INFO] [stdout]    |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:58:5
[INFO] [stdout]    |
[INFO] [stdout] 58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:37:10
[INFO] [stdout]    |
[INFO] [stdout] 37 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:36:5
[INFO] [stdout]    |
[INFO] [stdout] 36 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:37:11
[INFO] [stdout]    |
[INFO] [stdout] 37 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:58:26
[INFO] [stdout]    |
[INFO] [stdout] 58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]    |                          ----^^^^
[INFO] [stdout]    |                          |
[INFO] [stdout]    |                          help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:14
[INFO] [stdout]    |
[INFO] [stdout] 42 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:15
[INFO] [stdout]    |
[INFO] [stdout] 42 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:9
[INFO] [stdout]    |
[INFO] [stdout] 65 |         self.assign(transmute_copy(&value));
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:63:5
[INFO] [stdout]    |
[INFO] [stdout] 63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:9
[INFO] [stdout]    |
[INFO] [stdout] 47 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:46:5
[INFO] [stdout]    |
[INFO] [stdout] 46 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:21
[INFO] [stdout]    |
[INFO] [stdout] 65 |         self.assign(transmute_copy(&value));
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:9
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:51:5
[INFO] [stdout]    |
[INFO] [stdout] 51 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 52 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:39
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:63:43
[INFO] [stdout]    |
[INFO] [stdout] 63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]    |                                           ----^^^^
[INFO] [stdout]    |                                           |
[INFO] [stdout]    |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:54:39
[INFO] [stdout]    |
[INFO] [stdout] 54 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:13
[INFO] [stdout]    |
[INFO] [stdout] 73 |             *self.ptr = value;
[INFO] [stdout]    |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:69:5
[INFO] [stdout]    |
[INFO] [stdout] 69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:69:32
[INFO] [stdout]    |
[INFO] [stdout] 69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]    |                                ----^^^^
[INFO] [stdout]    |                                |
[INFO] [stdout]    |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:9
[INFO] [stdout]    |
[INFO] [stdout] 59 |         *self.ptr = value;
[INFO] [stdout]    |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:58:5
[INFO] [stdout]    |
[INFO] [stdout] 58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:80:9
[INFO] [stdout]    |
[INFO] [stdout] 80 |         transmute(self.ptr)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:5
[INFO] [stdout]    |
[INFO] [stdout] 79 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:58:26
[INFO] [stdout]    |
[INFO] [stdout] 58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]    |                          ----^^^^
[INFO] [stdout]    |                          |
[INFO] [stdout]    |                          help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:85:9
[INFO] [stdout]    |
[INFO] [stdout] 85 |         transmute(self.ptr)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:5
[INFO] [stdout]    |
[INFO] [stdout] 84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:43
[INFO] [stdout]    |
[INFO] [stdout] 84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]    |                                           ----^^^^
[INFO] [stdout]    |                                           |
[INFO] [stdout]    |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:9
[INFO] [stdout]    |
[INFO] [stdout] 65 |         self.assign(transmute_copy(&value));
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:63:5
[INFO] [stdout]    |
[INFO] [stdout] 63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:90:9
[INFO] [stdout]    |
[INFO] [stdout] 90 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:5
[INFO] [stdout]    |
[INFO] [stdout] 89 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:21
[INFO] [stdout]    |
[INFO] [stdout] 65 |         self.assign(transmute_copy(&value));
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:63:43
[INFO] [stdout]    |
[INFO] [stdout] 63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]    |                                           ----^^^^
[INFO] [stdout]    |                                           |
[INFO] [stdout]    |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:18
[INFO] [stdout]    |
[INFO] [stdout] 96 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:94:5
[INFO] [stdout]    |
[INFO] [stdout] 94 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:13
[INFO] [stdout]    |
[INFO] [stdout] 73 |             *self.ptr = value;
[INFO] [stdout]    |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:69:5
[INFO] [stdout]    |
[INFO] [stdout] 69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:104:18
[INFO] [stdout]     |
[INFO] [stdout] 104 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:5
[INFO] [stdout]     |
[INFO] [stdout] 102 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:69:32
[INFO] [stdout]    |
[INFO] [stdout] 69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]    |                                ----^^^^
[INFO] [stdout]    |                                |
[INFO] [stdout]    |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:80:9
[INFO] [stdout]    |
[INFO] [stdout] 80 |         transmute(self.ptr)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:5
[INFO] [stdout]    |
[INFO] [stdout] 79 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:18
[INFO] [stdout]     |
[INFO] [stdout] 112 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:110:5
[INFO] [stdout]     |
[INFO] [stdout] 110 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:85:9
[INFO] [stdout]    |
[INFO] [stdout] 85 |         transmute(self.ptr)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:5
[INFO] [stdout]    |
[INFO] [stdout] 84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:43
[INFO] [stdout]    |
[INFO] [stdout] 84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]    |                                           ----^^^^
[INFO] [stdout]    |                                           |
[INFO] [stdout]    |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:90:9
[INFO] [stdout]    |
[INFO] [stdout] 90 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:5
[INFO] [stdout]    |
[INFO] [stdout] 89 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:141:9
[INFO] [stdout]     |
[INFO] [stdout] 141 |         transmute(raw)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:140:5
[INFO] [stdout]     |
[INFO] [stdout] 140 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:149:9
[INFO] [stdout]     |
[INFO] [stdout] 149 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:148:5
[INFO] [stdout]     |
[INFO] [stdout] 148 |     pub unsafe fn free(self) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:167:9
[INFO] [stdout]     |
[INFO] [stdout] 167 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:166:5
[INFO] [stdout]     |
[INFO] [stdout] 166 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:171:5
[INFO] [stdout]     |
[INFO] [stdout] 171 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:171:36
[INFO] [stdout]     |
[INFO] [stdout] 171 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:18
[INFO] [stdout]    |
[INFO] [stdout] 96 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:94:5
[INFO] [stdout]    |
[INFO] [stdout] 94 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:204:9
[INFO] [stdout]     |
[INFO] [stdout] 204 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:203:5
[INFO] [stdout]     |
[INFO] [stdout] 203 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:104:18
[INFO] [stdout]     |
[INFO] [stdout] 104 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:5
[INFO] [stdout]     |
[INFO] [stdout] 102 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:18
[INFO] [stdout]     |
[INFO] [stdout] 112 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:110:5
[INFO] [stdout]     |
[INFO] [stdout] 110 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:209:9
[INFO] [stdout]     |
[INFO] [stdout] 209 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:208:5
[INFO] [stdout]     |
[INFO] [stdout] 208 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:208:41
[INFO] [stdout]     |
[INFO] [stdout] 208 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:141:9
[INFO] [stdout]     |
[INFO] [stdout] 141 |         transmute(raw)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:140:5
[INFO] [stdout]     |
[INFO] [stdout] 140 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:149:9
[INFO] [stdout]     |
[INFO] [stdout] 149 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:148:5
[INFO] [stdout]     |
[INFO] [stdout] 148 |     pub unsafe fn free(self) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:215:9
[INFO] [stdout]     |
[INFO] [stdout] 215 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:214:5
[INFO] [stdout]     |
[INFO] [stdout] 214 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:167:9
[INFO] [stdout]     |
[INFO] [stdout] 167 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:166:5
[INFO] [stdout]     |
[INFO] [stdout] 166 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:172:9
[INFO] [stdout]     |
[INFO] [stdout] 172 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:171:5
[INFO] [stdout]     |
[INFO] [stdout] 171 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:171:36
[INFO] [stdout]     |
[INFO] [stdout] 171 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:257:9
[INFO] [stdout]     |
[INFO] [stdout] 257 |         unsafe {
[INFO] [stdout]     |         ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:204:9
[INFO] [stdout]     |
[INFO] [stdout] 204 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:203:5
[INFO] [stdout]     |
[INFO] [stdout] 203 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:24:66
[INFO] [stdout]    |
[INFO] [stdout] 24 |         UnsafeSharedRef{ptr: NonNull::<UnsafeCell<T>>::from_mut( transmute(UnsafeCell::new(&mut self.value)))  }
[INFO] [stdout]    |                                                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:23:5
[INFO] [stdout]    |
[INFO] [stdout] 23 |     pub unsafe fn take_ref(&mut self) -> UnsafeSharedRef<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:209:9
[INFO] [stdout]     |
[INFO] [stdout] 209 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:208:5
[INFO] [stdout]     |
[INFO] [stdout] 208 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:208:41
[INFO] [stdout]     |
[INFO] [stdout] 208 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:215:9
[INFO] [stdout]     |
[INFO] [stdout] 215 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:214:5
[INFO] [stdout]     |
[INFO] [stdout] 214 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:257:9
[INFO] [stdout]     |
[INFO] [stdout] 257 |         unsafe {
[INFO] [stdout]     |         ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:3:5
[INFO] [stdout]   |
[INFO] [stdout] 3 |     std::mem::transmute::<&'a T, &'b T>(r)
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]   |
[INFO] [stdout]   = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]   = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:2:1
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub unsafe fn extend_lifetime<'a, 'b, T>(r: &'a T) -> &'b T {
[INFO] [stdout]   | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:280:13
[INFO] [stdout]     |
[INFO] [stdout] 280 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stdout]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:8:5
[INFO] [stdout]   |
[INFO] [stdout] 8 |     std::mem::transmute::<&'a mut T, &'b mut T>(r)
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]   |
[INFO] [stdout]   = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]   = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:7:1
[INFO] [stdout]   |
[INFO] [stdout] 7 | pub unsafe fn extend_lifetime_mut<'a, 'b, T>(r: &'a mut T) -> &'b mut T {
[INFO] [stdout]   | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `wide_null`
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:283:17
[INFO] [stdout]     |
[INFO] [stdout] 283 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stdout]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: Sized> RawPtr<T> {
[INFO] [stdout]    | ------------------------ associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:24:66
[INFO] [stdout]    |
[INFO] [stdout] 24 |         UnsafeSharedRef{ptr: NonNull::<UnsafeCell<T>>::from_mut( transmute(UnsafeCell::new(&mut self.value)))  }
[INFO] [stdout]    |                                                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:23:5
[INFO] [stdout]    |
[INFO] [stdout] 23 |     pub unsafe fn take_ref(&mut self) -> UnsafeSharedRef<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:36:35
[INFO] [stdout]     |
[INFO] [stdout]  36 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]     |                                   ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout]     |
[INFO] [stdout]     = note: requested on the command line with `-D inherent-method-on-receiver`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:41:39
[INFO] [stdout]     |
[INFO] [stdout]  41 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]     |                                       ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:46:33
[INFO] [stdout]     |
[INFO] [stdout]  46 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]     |                                 ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:51:47
[INFO] [stdout]     |
[INFO] [stdout]  51 |     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout]     |                                               ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:58:26
[INFO] [stdout]     |
[INFO] [stdout]  58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:63:43
[INFO] [stdout]     |
[INFO] [stdout]  63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:3:5
[INFO] [stdout]   |
[INFO] [stdout] 3 |     std::mem::transmute::<&'a T, &'b T>(r)
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]   |
[INFO] [stdout]   = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]   = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:2:1
[INFO] [stdout]   |
[INFO] [stdout] 2 | pub unsafe fn extend_lifetime<'a, 'b, T>(r: &'a T) -> &'b T {
[INFO] [stdout]   | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:69:32
[INFO] [stdout]     |
[INFO] [stdout]  69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:79:37
[INFO] [stdout]     |
[INFO] [stdout]  79 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |                                     ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:8:5
[INFO] [stdout]   |
[INFO] [stdout] 8 |     std::mem::transmute::<&'a mut T, &'b mut T>(r)
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]   |
[INFO] [stdout]   = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]   = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]  --> src/unsafe_std/lifetimes.rs:7:1
[INFO] [stdout]   |
[INFO] [stdout] 7 | pub unsafe fn extend_lifetime_mut<'a, 'b, T>(r: &'a mut T) -> &'b mut T {
[INFO] [stdout]   | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:84:43
[INFO] [stdout]     |
[INFO] [stdout]  84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:89:33
[INFO] [stdout]     |
[INFO] [stdout]  89 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |                                 ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:118:26
[INFO] [stdout]     |
[INFO] [stdout] 118 |     pub unsafe fn rclone(&self) -> RawPtr<T> {
[INFO] [stdout]     |                          ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:23:28
[INFO] [stdout]    |
[INFO] [stdout] 23 |     pub unsafe fn take_ref(&mut self) -> UnsafeSharedRef<T> {
[INFO] [stdout]    |                            ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 28 | impl<T> Deref for UnsafeShared<T> {
[INFO] [stdout]    | --------------------------------- trait implemented here
[INFO] [stdout] 29 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:36:35
[INFO] [stdout]     |
[INFO] [stdout]  36 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]     |                                   ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout]     |
[INFO] [stdout]     = note: requested on the command line with `-D inherent-method-on-receiver`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:41:39
[INFO] [stdout]     |
[INFO] [stdout]  41 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]     |                                       ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:46:33
[INFO] [stdout]     |
[INFO] [stdout]  46 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]     |                                 ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:51:47
[INFO] [stdout]     |
[INFO] [stdout]  51 |     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout]     |                                               ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:58:26
[INFO] [stdout]     |
[INFO] [stdout]  58 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:63:43
[INFO] [stdout]     |
[INFO] [stdout]  63 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:69:32
[INFO] [stdout]     |
[INFO] [stdout]  69 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:79:37
[INFO] [stdout]     |
[INFO] [stdout]  79 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |                                     ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:84:43
[INFO] [stdout]     |
[INFO] [stdout]  84 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:89:33
[INFO] [stdout]     |
[INFO] [stdout]  89 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |                                 ^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:118:26
[INFO] [stdout]     |
[INFO] [stdout] 118 |     pub unsafe fn rclone(&self) -> RawPtr<T> {
[INFO] [stdout]     |                          ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 220 | impl<T> Deref for RawPtr<T> {
[INFO] [stdout]     | --------------------------- trait implemented here
[INFO] [stdout] 221 |     type Target = T;
[INFO] [stdout]     |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/unsafe_std/ptrs/unsafe_shared.rs:23:28
[INFO] [stdout]    |
[INFO] [stdout] 23 |     pub unsafe fn take_ref(&mut self) -> UnsafeSharedRef<T> {
[INFO] [stdout]    |                            ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 28 | impl<T> Deref for UnsafeShared<T> {
[INFO] [stdout]    | --------------------------------- trait implemented here
[INFO] [stdout] 29 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `lv-std` (lib) due to 12 previous errors; 48 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stderr] error: could not compile `lv-std` (lib test) due to 12 previous errors; 49 warnings emitted
[INFO] running `Command { std: "docker" "inspect" "70ee985ce790b5a5284b8387b259bbfe5ec18de021d2f9257e2bbec368dcce7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "70ee985ce790b5a5284b8387b259bbfe5ec18de021d2f9257e2bbec368dcce7d", kill_on_drop: false }`
[INFO] [stdout] 70ee985ce790b5a5284b8387b259bbfe5ec18de021d2f9257e2bbec368dcce7d
