[INFO] fetching crate bern-kernel 0.3.1...
[INFO] checking bern-kernel-0.3.1 against try#7b3da9103634dffd4f4365cfd8642427c781d99f+rustflags=-Dinherent-method-on-receiver for 152214-denied
[INFO] extracting crate bern-kernel 0.3.1 into /workspace/builds/worker-0-tc2/source
[INFO] started tweaking crates.io crate bern-kernel 0.3.1
[INFO] finished tweaking crates.io crate bern-kernel 0.3.1
[INFO] tweaked toml for crates.io crate bern-kernel 0.3.1 written to /workspace/builds/worker-0-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate bern-kernel 0.3.1 on toolchain 7b3da9103634dffd4f4365cfd8642427c781d99f
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate bern-kernel 0.3.1 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 5b67c0c6460f2fe550f7e69ca19c6e417df6e23d6fa0b1613ae11c6992ced73b
[INFO] running `Command { std: "docker" "start" "-a" "5b67c0c6460f2fe550f7e69ca19c6e417df6e23d6fa0b1613ae11c6992ced73b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "5b67c0c6460f2fe550f7e69ca19c6e417df6e23d6fa0b1613ae11c6992ced73b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "5b67c0c6460f2fe550f7e69ca19c6e417df6e23d6fa0b1613ae11c6992ced73b", kill_on_drop: false }`
[INFO] [stdout] 5b67c0c6460f2fe550f7e69ca19c6e417df6e23d6fa0b1613ae11c6992ced73b
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dinherent-method-on-receiver" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+7b3da9103634dffd4f4365cfd8642427c781d99f" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 9e729ed0da166cca8e17120a401d2a42c9fef627f453b840c54c13e89dfa62e6
[INFO] running `Command { std: "docker" "start" "-a" "9e729ed0da166cca8e17120a401d2a42c9fef627f453b840c54c13e89dfa62e6", kill_on_drop: false }`
[INFO] [stderr]    Compiling serde_core v1.0.221
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]     Checking memchr v2.7.5
[INFO] [stderr]    Compiling serde v1.0.221
[INFO] [stderr]     Checking regex-syntax v0.8.6
[INFO] [stderr]    Compiling unicode-xid v0.2.6
[INFO] [stderr]    Compiling num-rational v0.3.2
[INFO] [stderr]     Checking downcast v0.11.0
[INFO] [stderr]     Checking fragile v2.0.1
[INFO] [stderr]     Checking cfg-if v1.0.3
[INFO] [stderr]    Compiling bern-arch v0.4.0
[INFO] [stderr]    Compiling quote v1.0.40
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]     Checking rtos-trace v0.2.0
[INFO] [stderr]    Compiling syn v2.0.106
[INFO] [stderr]    Compiling const_format_proc_macros v0.2.34
[INFO] [stderr]     Checking aho-corasick v1.1.3
[INFO] [stderr]     Checking num-integer v0.1.46
[INFO] [stderr]     Checking float-cmp v0.9.0
[INFO] [stderr]     Checking num-complex v0.3.1
[INFO] [stderr]    Compiling const_format v0.2.34
[INFO] [stderr]     Checking num-iter v0.1.45
[INFO] [stderr]     Checking regex-automata v0.4.10
[INFO] [stderr]     Checking num v0.3.1
[INFO] [stderr]     Checking embedded-time v0.12.1
[INFO] [stderr]     Checking regex v1.11.2
[INFO] [stderr]    Compiling derive_more v0.99.20
[INFO] [stderr]    Compiling serde_derive v1.0.221
[INFO] [stderr]     Checking predicates v2.1.5
[INFO] [stderr]    Compiling mockall_derive v0.11.4
[INFO] [stderr]    Compiling bern-units v0.1.0
[INFO] [stderr]     Checking bern-conf-type v0.2.1
[INFO] [stderr]     Checking bern-conf v0.2.0
[INFO] [stderr]    Compiling bern-kernel v0.3.1 (/opt/rustwide/workdir)
[INFO] [stderr]    Compiling bern-kernel-macros v0.3.0
[INFO] [stderr]     Checking mockall v0.11.4
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/alloc/const_pool.rs:21:19
[INFO] [stdout]    |
[INFO] [stdout] 21 |     pub fn locked(&self) -> bool {
[INFO] [stdout]    |                   ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 39 | impl<T> Deref for Item<T> {
[INFO] [stdout]    | ------------------------- trait implemented here
[INFO] [stdout] 40 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout]    |
[INFO] [stdout]    = note: requested on the command line with `-D inherent-method-on-receiver`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/alloc/const_pool.rs:25:24
[INFO] [stdout]    |
[INFO] [stdout] 25 |     pub fn try_acquire(&self) -> Option<ConstBox<T>> {
[INFO] [stdout]    |                        ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 39 | impl<T> Deref for Item<T> {
[INFO] [stdout]    | ------------------------- trait implemented here
[INFO] [stdout] 40 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stdout]   --> src/sched.rs:57:13
[INFO] [stdout]    |
[INFO] [stdout] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |             |
[INFO] [stdout]    |             this code causes undefined behavior when executed
[INFO] [stdout]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: raw pointers must be initialized (in this struct field)
[INFO] [stdout]   --> src/mem/linked_list.rs:95:5
[INFO] [stdout]    |
[INFO] [stdout] 95 |     head: Link<T>,
[INFO] [stdout]    |     ^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:84:32
[INFO] [stdout]    |
[INFO] [stdout] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:95:32
[INFO] [stdout]    |
[INFO] [stdout] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:121:32
[INFO] [stdout]     |
[INFO] [stdout] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:154:32
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:174:32
[INFO] [stdout]     |
[INFO] [stdout] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:191:32
[INFO] [stdout]     |
[INFO] [stdout] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:236:32
[INFO] [stdout]     |
[INFO] [stdout] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:247:32
[INFO] [stdout]     |
[INFO] [stdout] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:260:32
[INFO] [stdout]     |
[INFO] [stdout] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:280:32
[INFO] [stdout]     |
[INFO] [stdout] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:304:30
[INFO] [stdout]     |
[INFO] [stdout] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:356:32
[INFO] [stdout]     |
[INFO] [stdout] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:372:32
[INFO] [stdout]     |
[INFO] [stdout] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:378:32
[INFO] [stdout]     |
[INFO] [stdout] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:424:32
[INFO] [stdout]     |
[INFO] [stdout] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:503:32
[INFO] [stdout]     |
[INFO] [stdout] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:18:21
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                       +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:19:19
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:44
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stdout]    |                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:56
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:265:54
[INFO] [stdout]     |
[INFO] [stdout] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:266:64
[INFO] [stdout]     |
[INFO] [stdout] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:272:43
[INFO] [stdout]     |
[INFO] [stdout] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:273:63
[INFO] [stdout]     |
[INFO] [stdout] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:280:26
[INFO] [stdout]     |
[INFO] [stdout] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stdout] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:286:64
[INFO] [stdout]     |
[INFO] [stdout] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bern-kernel` (lib) due to 2 previous errors; 27 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:108:40
[INFO] [stdout]     |
[INFO] [stdout] 108 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:109:40
[INFO] [stdout]     |
[INFO] [stdout] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:109:60
[INFO] [stdout]     |
[INFO] [stdout] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:149:40
[INFO] [stdout]     |
[INFO] [stdout] 149 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:150:40
[INFO] [stdout]     |
[INFO] [stdout] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:150:60
[INFO] [stdout]     |
[INFO] [stdout] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/alloc/const_pool.rs:21:19
[INFO] [stdout]    |
[INFO] [stdout] 21 |     pub fn locked(&self) -> bool {
[INFO] [stdout]    |                   ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 39 | impl<T> Deref for Item<T> {
[INFO] [stdout]    | ------------------------- trait implemented here
[INFO] [stdout] 40 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout]    |
[INFO] [stdout]    = note: requested on the command line with `-D inherent-method-on-receiver`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: inherent methods on types that implement `Deref` or `Receiver` shadow methods of their target
[INFO] [stdout]   --> src/alloc/const_pool.rs:25:24
[INFO] [stdout]    |
[INFO] [stdout] 25 |     pub fn try_acquire(&self) -> Option<ConstBox<T>> {
[INFO] [stdout]    |                        ^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 39 | impl<T> Deref for Item<T> {
[INFO] [stdout]    | ------------------------- trait implemented here
[INFO] [stdout] 40 |     type Target = T;
[INFO] [stdout]    |     ----------- with `Target` set here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:191:34
[INFO] [stdout]     |
[INFO] [stdout] 191 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 191 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:208:34
[INFO] [stdout]     |
[INFO] [stdout] 208 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 208 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:224:34
[INFO] [stdout]     |
[INFO] [stdout] 224 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 224 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:188:37
[INFO] [stdout]     |
[INFO] [stdout] 188 |             partion.init_from_slice(BUFFER.as_mut());
[INFO] [stdout]     |                                     ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:200:56
[INFO] [stdout]     |
[INFO] [stdout] 200 |             POOL.partition(0).unwrap().init_from_slice(BUFFER.as_mut());
[INFO] [stdout]     |                                                        ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:236:34
[INFO] [stdout]     |
[INFO] [stdout] 236 |                 .init_from_slice(BUFFER_1.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:239:34
[INFO] [stdout]     |
[INFO] [stdout] 239 |                 .init_from_slice(BUFFER_2.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:242:34
[INFO] [stdout]     |
[INFO] [stdout] 242 |                 .init_from_slice(BUFFER_3.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:440:40
[INFO] [stdout]     |
[INFO] [stdout] 440 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:441:40
[INFO] [stdout]     |
[INFO] [stdout] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:441:60
[INFO] [stdout]     |
[INFO] [stdout] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:477:40
[INFO] [stdout]     |
[INFO] [stdout] 477 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:478:40
[INFO] [stdout]     |
[INFO] [stdout] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:478:60
[INFO] [stdout]     |
[INFO] [stdout] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:498:40
[INFO] [stdout]     |
[INFO] [stdout] 498 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:499:40
[INFO] [stdout]     |
[INFO] [stdout] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:499:60
[INFO] [stdout]     |
[INFO] [stdout] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:524:40
[INFO] [stdout]     |
[INFO] [stdout] 524 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:525:40
[INFO] [stdout]     |
[INFO] [stdout] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:525:60
[INFO] [stdout]     |
[INFO] [stdout] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:541:40
[INFO] [stdout]     |
[INFO] [stdout] 541 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:542:40
[INFO] [stdout]     |
[INFO] [stdout] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:542:60
[INFO] [stdout]     |
[INFO] [stdout] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:566:40
[INFO] [stdout]     |
[INFO] [stdout] 566 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:567:40
[INFO] [stdout]     |
[INFO] [stdout] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:567:60
[INFO] [stdout]     |
[INFO] [stdout] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:593:40
[INFO] [stdout]     |
[INFO] [stdout] 593 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:594:40
[INFO] [stdout]     |
[INFO] [stdout] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:594:60
[INFO] [stdout]     |
[INFO] [stdout] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:631:40
[INFO] [stdout]     |
[INFO] [stdout] 631 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:632:40
[INFO] [stdout]     |
[INFO] [stdout] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:632:60
[INFO] [stdout]     |
[INFO] [stdout] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:199:22
[INFO] [stdout]     |
[INFO] [stdout] 199 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stdout]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:223:22
[INFO] [stdout]     |
[INFO] [stdout] 223 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stdout]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:230:25
[INFO] [stdout]     |
[INFO] [stdout] 230 |             let mut i = LIST_BUFFER.len();
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stdout]   --> src/sched.rs:57:13
[INFO] [stdout]    |
[INFO] [stdout] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |             |
[INFO] [stdout]    |             this code causes undefined behavior when executed
[INFO] [stdout]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: raw pointers must be initialized (in this struct field)
[INFO] [stdout]   --> src/mem/linked_list.rs:95:5
[INFO] [stdout]    |
[INFO] [stdout] 95 |     head: Link<T>,
[INFO] [stdout]    |     ^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:84:32
[INFO] [stdout]    |
[INFO] [stdout] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:95:32
[INFO] [stdout]    |
[INFO] [stdout] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:121:32
[INFO] [stdout]     |
[INFO] [stdout] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:154:32
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:174:32
[INFO] [stdout]     |
[INFO] [stdout] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:191:32
[INFO] [stdout]     |
[INFO] [stdout] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:236:32
[INFO] [stdout]     |
[INFO] [stdout] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:247:32
[INFO] [stdout]     |
[INFO] [stdout] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:260:32
[INFO] [stdout]     |
[INFO] [stdout] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:280:32
[INFO] [stdout]     |
[INFO] [stdout] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:304:30
[INFO] [stdout]     |
[INFO] [stdout] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:356:32
[INFO] [stdout]     |
[INFO] [stdout] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:372:32
[INFO] [stdout]     |
[INFO] [stdout] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:378:32
[INFO] [stdout]     |
[INFO] [stdout] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:424:32
[INFO] [stdout]     |
[INFO] [stdout] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:503:32
[INFO] [stdout]     |
[INFO] [stdout] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:18:21
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                       +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:19:19
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:44
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stdout]    |                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:56
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:265:54
[INFO] [stdout]     |
[INFO] [stdout] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:266:64
[INFO] [stdout]     |
[INFO] [stdout] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:272:43
[INFO] [stdout]     |
[INFO] [stdout] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:273:63
[INFO] [stdout]     |
[INFO] [stdout] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:280:26
[INFO] [stdout]     |
[INFO] [stdout] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stdout] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:286:64
[INFO] [stdout]     |
[INFO] [stdout] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bern-kernel` (lib test) due to 2 previous errors; 68 warnings emitted
[INFO] running `Command { std: "docker" "inspect" "9e729ed0da166cca8e17120a401d2a42c9fef627f453b840c54c13e89dfa62e6", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "9e729ed0da166cca8e17120a401d2a42c9fef627f453b840c54c13e89dfa62e6", kill_on_drop: false }`
[INFO] [stdout] 9e729ed0da166cca8e17120a401d2a42c9fef627f453b840c54c13e89dfa62e6
