[INFO] fetching crate bern-kernel 0.3.1...
[INFO] testing bern-kernel-0.3.1 against beta-2025-09-21 for beta-1.91-2
[INFO] extracting crate bern-kernel 0.3.1 into /workspace/builds/worker-2-tc2/source
[INFO] started tweaking crates.io crate bern-kernel 0.3.1
[INFO] finished tweaking crates.io crate bern-kernel 0.3.1
[INFO] tweaked toml for crates.io crate bern-kernel 0.3.1 written to /workspace/builds/worker-2-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate bern-kernel 0.3.1 on toolchain beta-2025-09-21
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+beta-2025-09-21" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate bern-kernel 0.3.1 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+beta-2025-09-21" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2025-09-21" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] ab940890cf147038aaf49503be4fea61f672377d84402b34e9773514753a0430
[INFO] running `Command { std: "docker" "start" "-a" "ab940890cf147038aaf49503be4fea61f672377d84402b34e9773514753a0430", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "ab940890cf147038aaf49503be4fea61f672377d84402b34e9773514753a0430", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "ab940890cf147038aaf49503be4fea61f672377d84402b34e9773514753a0430", kill_on_drop: false }`
[INFO] [stdout] ab940890cf147038aaf49503be4fea61f672377d84402b34e9773514753a0430
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2025-09-21" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 191fafd2a92f4f9267db9369e31e002b9286981c83e1339a9f5beeb3802aa17e
[INFO] running `Command { std: "docker" "start" "-a" "191fafd2a92f4f9267db9369e31e002b9286981c83e1339a9f5beeb3802aa17e", kill_on_drop: false }`
[INFO] [stderr]    Compiling memchr v2.7.5
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]    Compiling serde_core v1.0.221
[INFO] [stderr]    Compiling serde v1.0.221
[INFO] [stderr]    Compiling num-rational v0.3.2
[INFO] [stderr]    Compiling either v1.15.0
[INFO] [stderr]    Compiling syn v2.0.106
[INFO] [stderr]    Compiling unicode-xid v0.2.6
[INFO] [stderr]    Compiling predicates-core v1.0.9
[INFO] [stderr]    Compiling const_format_proc_macros v0.2.34
[INFO] [stderr]    Compiling itertools v0.10.5
[INFO] [stderr]    Compiling float-cmp v0.9.0
[INFO] [stderr]    Compiling aho-corasick v1.1.3
[INFO] [stderr]    Compiling termtree v0.5.1
[INFO] [stderr]    Compiling difflib v0.4.0
[INFO] [stderr]    Compiling normalize-line-endings v0.3.0
[INFO] [stderr]    Compiling predicates-tree v1.0.12
[INFO] [stderr]    Compiling const_format v0.2.34
[INFO] [stderr]    Compiling num-iter v0.1.45
[INFO] [stderr]    Compiling num-complex v0.3.1
[INFO] [stderr]    Compiling downcast v0.11.0
[INFO] [stderr]    Compiling fragile v2.0.1
[INFO] [stderr]    Compiling regex-automata v0.4.10
[INFO] [stderr]    Compiling bern-arch v0.4.0
[INFO] [stderr]    Compiling rtos-trace v0.2.0
[INFO] [stderr]    Compiling num v0.3.1
[INFO] [stderr]    Compiling embedded-time v0.12.1
[INFO] [stderr]    Compiling derive_more v0.99.20
[INFO] [stderr]    Compiling serde_derive v1.0.221
[INFO] [stderr]    Compiling mockall_derive v0.11.4
[INFO] [stderr]    Compiling regex v1.11.2
[INFO] [stderr]    Compiling predicates v2.1.5
[INFO] [stderr]    Compiling bern-units v0.1.0
[INFO] [stderr]    Compiling bern-conf-type v0.2.1
[INFO] [stderr]    Compiling bern-conf v0.2.0
[INFO] [stderr]    Compiling bern-kernel v0.3.1 (/opt/rustwide/workdir)
[INFO] [stderr]    Compiling bern-kernel-macros v0.3.0
[INFO] [stderr]    Compiling mockall v0.11.4
[INFO] [stdout] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stdout]   --> src/sched.rs:57:13
[INFO] [stdout]    |
[INFO] [stdout] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |             |
[INFO] [stdout]    |             this code causes undefined behavior when executed
[INFO] [stdout]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: raw pointers must be initialized (in this struct field)
[INFO] [stdout]   --> src/mem/linked_list.rs:95:5
[INFO] [stdout]    |
[INFO] [stdout] 95 |     head: Link<T>,
[INFO] [stdout]    |     ^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:84:32
[INFO] [stdout]    |
[INFO] [stdout] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:95:32
[INFO] [stdout]    |
[INFO] [stdout] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:121:32
[INFO] [stdout]     |
[INFO] [stdout] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:154:32
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:174:32
[INFO] [stdout]     |
[INFO] [stdout] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:191:32
[INFO] [stdout]     |
[INFO] [stdout] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:236:32
[INFO] [stdout]     |
[INFO] [stdout] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:247:32
[INFO] [stdout]     |
[INFO] [stdout] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:260:32
[INFO] [stdout]     |
[INFO] [stdout] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:280:32
[INFO] [stdout]     |
[INFO] [stdout] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:304:30
[INFO] [stdout]     |
[INFO] [stdout] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:356:32
[INFO] [stdout]     |
[INFO] [stdout] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:372:32
[INFO] [stdout]     |
[INFO] [stdout] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:378:32
[INFO] [stdout]     |
[INFO] [stdout] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:424:32
[INFO] [stdout]     |
[INFO] [stdout] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:503:32
[INFO] [stdout]     |
[INFO] [stdout] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:18:21
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                       +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:19:19
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:44
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stdout]    |                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:56
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:265:54
[INFO] [stdout]     |
[INFO] [stdout] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:266:64
[INFO] [stdout]     |
[INFO] [stdout] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:272:43
[INFO] [stdout]     |
[INFO] [stdout] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:273:63
[INFO] [stdout]     |
[INFO] [stdout] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:280:26
[INFO] [stdout]     |
[INFO] [stdout] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stdout] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:286:64
[INFO] [stdout]     |
[INFO] [stdout] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 40.80s
[INFO] running `Command { std: "docker" "inspect" "191fafd2a92f4f9267db9369e31e002b9286981c83e1339a9f5beeb3802aa17e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "191fafd2a92f4f9267db9369e31e002b9286981c83e1339a9f5beeb3802aa17e", kill_on_drop: false }`
[INFO] [stdout] 191fafd2a92f4f9267db9369e31e002b9286981c83e1339a9f5beeb3802aa17e
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2025-09-21" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 79d45211f4e4662d61020e926e11f4aea72d3c2417058759556a94bb9aa92f67
[INFO] running `Command { std: "docker" "start" "-a" "79d45211f4e4662d61020e926e11f4aea72d3c2417058759556a94bb9aa92f67", kill_on_drop: false }`
[INFO] [stderr]    Compiling bern-kernel v0.3.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stdout]   --> src/sched.rs:57:13
[INFO] [stdout]    |
[INFO] [stdout] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |             |
[INFO] [stdout]    |             this code causes undefined behavior when executed
[INFO] [stdout]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: raw pointers must be initialized (in this struct field)
[INFO] [stdout]   --> src/mem/linked_list.rs:95:5
[INFO] [stdout]    |
[INFO] [stdout] 95 |     head: Link<T>,
[INFO] [stdout]    |     ^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:84:32
[INFO] [stdout]    |
[INFO] [stdout] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:95:32
[INFO] [stdout]    |
[INFO] [stdout] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:121:32
[INFO] [stdout]     |
[INFO] [stdout] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:154:32
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:174:32
[INFO] [stdout]     |
[INFO] [stdout] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:191:32
[INFO] [stdout]     |
[INFO] [stdout] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:236:32
[INFO] [stdout]     |
[INFO] [stdout] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:247:32
[INFO] [stdout]     |
[INFO] [stdout] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:260:32
[INFO] [stdout]     |
[INFO] [stdout] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:280:32
[INFO] [stdout]     |
[INFO] [stdout] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:304:30
[INFO] [stdout]     |
[INFO] [stdout] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:356:32
[INFO] [stdout]     |
[INFO] [stdout] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:372:32
[INFO] [stdout]     |
[INFO] [stdout] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:378:32
[INFO] [stdout]     |
[INFO] [stdout] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:424:32
[INFO] [stdout]     |
[INFO] [stdout] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:503:32
[INFO] [stdout]     |
[INFO] [stdout] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:18:21
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                       +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:19:19
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:44
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stdout]    |                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:56
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:265:54
[INFO] [stdout]     |
[INFO] [stdout] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:266:64
[INFO] [stdout]     |
[INFO] [stdout] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:272:43
[INFO] [stdout]     |
[INFO] [stdout] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:273:63
[INFO] [stdout]     |
[INFO] [stdout] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:280:26
[INFO] [stdout]     |
[INFO] [stdout] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stdout] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:286:64
[INFO] [stdout]     |
[INFO] [stdout] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:108:40
[INFO] [stdout]     |
[INFO] [stdout] 108 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:109:40
[INFO] [stdout]     |
[INFO] [stdout] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:109:60
[INFO] [stdout]     |
[INFO] [stdout] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:149:40
[INFO] [stdout]     |
[INFO] [stdout] 149 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:150:40
[INFO] [stdout]     |
[INFO] [stdout] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/alloc/bump.rs:150:60
[INFO] [stdout]     |
[INFO] [stdout] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:191:34
[INFO] [stdout]     |
[INFO] [stdout] 191 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 191 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:208:34
[INFO] [stdout]     |
[INFO] [stdout] 208 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 208 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/heap.rs:224:34
[INFO] [stdout]     |
[INFO] [stdout] 224 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 224 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stdout]     |                                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:188:37
[INFO] [stdout]     |
[INFO] [stdout] 188 |             partion.init_from_slice(BUFFER.as_mut());
[INFO] [stdout]     |                                     ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:200:56
[INFO] [stdout]     |
[INFO] [stdout] 200 |             POOL.partition(0).unwrap().init_from_slice(BUFFER.as_mut());
[INFO] [stdout]     |                                                        ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:236:34
[INFO] [stdout]     |
[INFO] [stdout] 236 |                 .init_from_slice(BUFFER_1.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:239:34
[INFO] [stdout]     |
[INFO] [stdout] 239 |                 .init_from_slice(BUFFER_2.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/alloc/pool.rs:242:34
[INFO] [stdout]     |
[INFO] [stdout] 242 |                 .init_from_slice(BUFFER_3.as_mut());
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:440:40
[INFO] [stdout]     |
[INFO] [stdout] 440 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:441:40
[INFO] [stdout]     |
[INFO] [stdout] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:441:60
[INFO] [stdout]     |
[INFO] [stdout] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:477:40
[INFO] [stdout]     |
[INFO] [stdout] 477 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:478:40
[INFO] [stdout]     |
[INFO] [stdout] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:478:60
[INFO] [stdout]     |
[INFO] [stdout] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:498:40
[INFO] [stdout]     |
[INFO] [stdout] 498 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:499:40
[INFO] [stdout]     |
[INFO] [stdout] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:499:60
[INFO] [stdout]     |
[INFO] [stdout] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:524:40
[INFO] [stdout]     |
[INFO] [stdout] 524 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:525:40
[INFO] [stdout]     |
[INFO] [stdout] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:525:60
[INFO] [stdout]     |
[INFO] [stdout] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:541:40
[INFO] [stdout]     |
[INFO] [stdout] 541 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:542:40
[INFO] [stdout]     |
[INFO] [stdout] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:542:60
[INFO] [stdout]     |
[INFO] [stdout] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:566:40
[INFO] [stdout]     |
[INFO] [stdout] 566 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:567:40
[INFO] [stdout]     |
[INFO] [stdout] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:567:60
[INFO] [stdout]     |
[INFO] [stdout] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:593:40
[INFO] [stdout]     |
[INFO] [stdout] 593 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:594:40
[INFO] [stdout]     |
[INFO] [stdout] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:594:60
[INFO] [stdout]     |
[INFO] [stdout] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:631:40
[INFO] [stdout]     |
[INFO] [stdout] 631 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:632:40
[INFO] [stdout]     |
[INFO] [stdout] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/linked_list.rs:632:60
[INFO] [stdout]     |
[INFO] [stdout] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stdout]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:199:22
[INFO] [stdout]     |
[INFO] [stdout] 199 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stdout]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:223:22
[INFO] [stdout]     |
[INFO] [stdout] 223 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stdout]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/mem/queue/mpmc_linked.rs:230:25
[INFO] [stdout]     |
[INFO] [stdout] 230 |             let mut i = LIST_BUFFER.len();
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stdout]   --> src/sched.rs:57:13
[INFO] [stdout]    |
[INFO] [stdout] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |             |
[INFO] [stdout]    |             this code causes undefined behavior when executed
[INFO] [stdout]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: raw pointers must be initialized (in this struct field)
[INFO] [stdout]   --> src/mem/linked_list.rs:95:5
[INFO] [stdout]    |
[INFO] [stdout] 95 |     head: Link<T>,
[INFO] [stdout]    |     ^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:84:32
[INFO] [stdout]    |
[INFO] [stdout] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched.rs:95:32
[INFO] [stdout]    |
[INFO] [stdout] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:121:32
[INFO] [stdout]     |
[INFO] [stdout] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:154:32
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:174:32
[INFO] [stdout]     |
[INFO] [stdout] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:191:32
[INFO] [stdout]     |
[INFO] [stdout] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:236:32
[INFO] [stdout]     |
[INFO] [stdout] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:247:32
[INFO] [stdout]     |
[INFO] [stdout] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:260:32
[INFO] [stdout]     |
[INFO] [stdout] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:280:32
[INFO] [stdout]     |
[INFO] [stdout] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:304:30
[INFO] [stdout]     |
[INFO] [stdout] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:356:32
[INFO] [stdout]     |
[INFO] [stdout] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:372:32
[INFO] [stdout]     |
[INFO] [stdout] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:378:32
[INFO] [stdout]     |
[INFO] [stdout] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:424:32
[INFO] [stdout]     |
[INFO] [stdout] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/sched.rs:503:32
[INFO] [stdout]     |
[INFO] [stdout] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:18:21
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                       +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:19:19
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stdout]    |                     +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:44
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stdout]    |                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/sched/idle.rs:36:56
[INFO] [stdout]    |
[INFO] [stdout] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stdout]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:265:54
[INFO] [stdout]     |
[INFO] [stdout] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stdout] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:266:64
[INFO] [stdout]     |
[INFO] [stdout] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:272:43
[INFO] [stdout]     |
[INFO] [stdout] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:273:63
[INFO] [stdout]     |
[INFO] [stdout] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stdout] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:280:26
[INFO] [stdout]     |
[INFO] [stdout] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stdout] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stdout]    --> src/syscall.rs:286:64
[INFO] [stdout]     |
[INFO] [stdout] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stdout]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stdout]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stdout]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stdout]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stdout] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stdout]     |
[INFO] [stdout] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stdout] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 2.26s
[INFO] running `Command { std: "docker" "inspect" "79d45211f4e4662d61020e926e11f4aea72d3c2417058759556a94bb9aa92f67", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "79d45211f4e4662d61020e926e11f4aea72d3c2417058759556a94bb9aa92f67", kill_on_drop: false }`
[INFO] [stdout] 79d45211f4e4662d61020e926e11f4aea72d3c2417058759556a94bb9aa92f67
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2025-09-21" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] bd2cb7de9f34ba2d32d0e704d2a31573aa08609eefab394f4be75da24b7992c0
[INFO] running `Command { std: "docker" "start" "-a" "bd2cb7de9f34ba2d32d0e704d2a31573aa08609eefab394f4be75da24b7992c0", kill_on_drop: false }`
[INFO] [stderr]    Compiling bern-kernel v0.3.1 (/opt/rustwide/workdir)
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:108:40
[INFO] [stderr]     |
[INFO] [stderr] 108 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:109:40
[INFO] [stderr]     |
[INFO] [stderr] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:109:60
[INFO] [stderr]     |
[INFO] [stderr] 109 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:149:40
[INFO] [stderr]     |
[INFO] [stderr] 149 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:150:40
[INFO] [stderr]     |
[INFO] [stderr] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/alloc/bump.rs:150:60
[INFO] [stderr]     |
[INFO] [stderr] 150 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/heap.rs:191:34
[INFO] [stderr]     |
[INFO] [stderr] 191 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] help: use `&raw mut` instead to create a raw pointer
[INFO] [stderr]     |
[INFO] [stderr] 191 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stderr]     |                                   +++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/heap.rs:208:34
[INFO] [stderr]     |
[INFO] [stderr] 208 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] help: use `&raw mut` instead to create a raw pointer
[INFO] [stderr]     |
[INFO] [stderr] 208 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stderr]     |                                   +++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/heap.rs:224:34
[INFO] [stderr]     |
[INFO] [stderr] 224 |             HEAP.init_from_slice(&mut HEAP_BUFFER);
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] help: use `&raw mut` instead to create a raw pointer
[INFO] [stderr]     |
[INFO] [stderr] 224 |             HEAP.init_from_slice(&raw mut HEAP_BUFFER);
[INFO] [stderr]     |                                   +++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/pool.rs:188:37
[INFO] [stderr]     |
[INFO] [stderr] 188 |             partion.init_from_slice(BUFFER.as_mut());
[INFO] [stderr]     |                                     ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/pool.rs:200:56
[INFO] [stderr]     |
[INFO] [stderr] 200 |             POOL.partition(0).unwrap().init_from_slice(BUFFER.as_mut());
[INFO] [stderr]     |                                                        ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/pool.rs:236:34
[INFO] [stderr]     |
[INFO] [stderr] 236 |                 .init_from_slice(BUFFER_1.as_mut());
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/pool.rs:239:34
[INFO] [stderr]     |
[INFO] [stderr] 239 |                 .init_from_slice(BUFFER_2.as_mut());
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/alloc/pool.rs:242:34
[INFO] [stderr]     |
[INFO] [stderr] 242 |                 .init_from_slice(BUFFER_3.as_mut());
[INFO] [stderr]     |                                  ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:440:40
[INFO] [stderr]     |
[INFO] [stderr] 440 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:441:40
[INFO] [stderr]     |
[INFO] [stderr] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:441:60
[INFO] [stderr]     |
[INFO] [stderr] 441 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:477:40
[INFO] [stderr]     |
[INFO] [stderr] 477 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:478:40
[INFO] [stderr]     |
[INFO] [stderr] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:478:60
[INFO] [stderr]     |
[INFO] [stderr] 478 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:498:40
[INFO] [stderr]     |
[INFO] [stderr] 498 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:499:40
[INFO] [stderr]     |
[INFO] [stderr] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:499:60
[INFO] [stderr]     |
[INFO] [stderr] 499 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:524:40
[INFO] [stderr]     |
[INFO] [stderr] 524 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:525:40
[INFO] [stderr]     |
[INFO] [stderr] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:525:60
[INFO] [stderr]     |
[INFO] [stderr] 525 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:541:40
[INFO] [stderr]     |
[INFO] [stderr] 541 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:542:40
[INFO] [stderr]     |
[INFO] [stderr] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:542:60
[INFO] [stderr]     |
[INFO] [stderr] 542 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:566:40
[INFO] [stderr]     |
[INFO] [stderr] 566 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:567:40
[INFO] [stderr]     |
[INFO] [stderr] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:567:60
[INFO] [stderr]     |
[INFO] [stderr] 567 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:593:40
[INFO] [stderr]     |
[INFO] [stderr] 593 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:594:40
[INFO] [stderr]     |
[INFO] [stderr] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:594:60
[INFO] [stderr]     |
[INFO] [stderr] 594 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:631:40
[INFO] [stderr]     |
[INFO] [stderr] 631 |                 NonNull::new_unchecked(BUFFER.as_ptr() as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:632:40
[INFO] [stderr]     |
[INFO] [stderr] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                        ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/linked_list.rs:632:60
[INFO] [stderr]     |
[INFO] [stderr] 632 |                 NonNull::new_unchecked(BUFFER.as_ptr().add(BUFFER.len()) as *mut _),
[INFO] [stderr]     |                                                            ^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/mem/queue/mpmc_linked.rs:199:22
[INFO] [stderr]     |
[INFO] [stderr] 199 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stderr]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/mem/queue/mpmc_linked.rs:223:22
[INFO] [stderr]     |
[INFO] [stderr] 223 |             for n in LIST_BUFFER.iter_mut() {
[INFO] [stderr]     |                      ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/mem/queue/mpmc_linked.rs:230:25
[INFO] [stderr]     |
[INFO] [stderr] 230 |             let mut i = LIST_BUFFER.len();
[INFO] [stderr]     |                         ^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: the type `[mem::linked_list::LinkedList<Runnable>; 8]` does not permit being left uninitialized
[INFO] [stderr]   --> src/sched.rs:57:13
[INFO] [stderr]    |
[INFO] [stderr] 57 |             MaybeUninit::uninit().assume_init();
[INFO] [stderr]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    |             |
[INFO] [stderr]    |             this code causes undefined behavior when executed
[INFO] [stderr]    |             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stderr]    |
[INFO] [stderr] note: raw pointers must be initialized (in this struct field)
[INFO] [stderr]   --> src/mem/linked_list.rs:95:5
[INFO] [stderr]    |
[INFO] [stderr] 95 |     head: Link<T>,
[INFO] [stderr]    |     ^^^^^^^^^^^^^
[INFO] [stderr]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]   --> src/sched.rs:84:32
[INFO] [stderr]    |
[INFO] [stderr] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]   --> src/sched.rs:95:32
[INFO] [stderr]    |
[INFO] [stderr] 95 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:121:32
[INFO] [stderr]     |
[INFO] [stderr] 121 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:154:32
[INFO] [stderr]     |
[INFO] [stderr] 154 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:174:32
[INFO] [stderr]     |
[INFO] [stderr] 174 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:191:32
[INFO] [stderr]     |
[INFO] [stderr] 191 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:236:32
[INFO] [stderr]     |
[INFO] [stderr] 236 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:247:32
[INFO] [stderr]     |
[INFO] [stderr] 247 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:260:32
[INFO] [stderr]     |
[INFO] [stderr] 260 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:280:32
[INFO] [stderr]     |
[INFO] [stderr] 280 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:304:30
[INFO] [stderr]     |
[INFO] [stderr] 304 |         let sched = unsafe { SCHEDULER.assume_init_mut() };
[INFO] [stderr]     |                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:356:32
[INFO] [stderr]     |
[INFO] [stderr] 356 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:372:32
[INFO] [stderr]     |
[INFO] [stderr] 372 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:378:32
[INFO] [stderr]     |
[INFO] [stderr] 378 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:424:32
[INFO] [stderr]     |
[INFO] [stderr] 424 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/sched.rs:503:32
[INFO] [stderr]     |
[INFO] [stderr] 503 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]     |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]   --> src/sched/idle.rs:18:21
[INFO] [stderr]    |
[INFO] [stderr] 18 |         data_start: (&__smprocess_default_idle) as *const _ as *const u8,
[INFO] [stderr]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] help: use `&raw const` instead to create a raw pointer
[INFO] [stderr]    |
[INFO] [stderr] 18 |         data_start: (&raw const __smprocess_default_idle) as *const _ as *const u8,
[INFO] [stderr]    |                       +++++++++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]   --> src/sched/idle.rs:19:19
[INFO] [stderr]    |
[INFO] [stderr] 19 |         data_end: (&__emprocess_default_idle) as *const _ as *const u8,
[INFO] [stderr]    |                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] help: use `&raw const` instead to create a raw pointer
[INFO] [stderr]    |
[INFO] [stderr] 19 |         data_end: (&raw const __emprocess_default_idle) as *const _ as *const u8,
[INFO] [stderr]    |                     +++++++++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]   --> src/sched/idle.rs:36:44
[INFO] [stderr]    |
[INFO] [stderr] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stderr]    |                                            ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr] help: use `&raw mut` instead to create a raw pointer
[INFO] [stderr]    |
[INFO] [stderr] 36 |                 .stack(unsafe { Stack::new(&raw mut STACK, STACK.len()) })
[INFO] [stderr]    |                                             +++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]   --> src/sched/idle.rs:36:56
[INFO] [stderr]    |
[INFO] [stderr] 36 |                 .stack(unsafe { Stack::new(&mut STACK, STACK.len()) })
[INFO] [stderr]    |                                                        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:265:54
[INFO] [stderr]     |
[INFO] [stderr] 265 |             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stderr]     |                                                      ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr]     = note: `#[warn(integer_to_ptr_transmutes)]` on by default
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 265 -             let recv_queue: &&dyn PushRaw = unsafe { mem::transmute(arg0) };
[INFO] [stderr] 265 +             let recv_queue: &&dyn PushRaw = unsafe { &*std::ptr::with_exposed_provenance::<&dyn PushRaw>(arg0) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:266:64
[INFO] [stderr]     |
[INFO] [stderr] 266 |             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stderr]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 266 -             let res: &mut Result<usize, AllocError> = unsafe { mem::transmute(arg1) };
[INFO] [stderr] 266 +             let res: &mut Result<usize, AllocError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<usize, allocator::AllocError>>(arg1) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:272:43
[INFO] [stderr]     |
[INFO] [stderr] 272 |             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stderr]     |                                           ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 272 -             let item: &RawItem = unsafe { mem::transmute(arg1) };
[INFO] [stderr] 272 +             let item: &RawItem = unsafe { &*std::ptr::with_exposed_provenance::<RawItem>(arg1) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:273:63
[INFO] [stderr]     |
[INFO] [stderr] 273 |             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stderr]     |                                                               ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 273 -             let res: &mut Result<(), ChannelError> = unsafe { mem::transmute(arg2) };
[INFO] [stderr] 273 +             let res: &mut Result<(), ChannelError> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(), ChannelError>>(arg2) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:280:26
[INFO] [stderr]     |
[INFO] [stderr] 280 |                 unsafe { mem::transmute(arg1) };
[INFO] [stderr]     |                          ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 280 -                 unsafe { mem::transmute(arg1) };
[INFO] [stderr] 280 +                 unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<(usize, usize), allocator::AllocError>>(arg1) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: transmuting an integer to a pointer creates a pointer without provenance
[INFO] [stderr]    --> src/syscall.rs:286:64
[INFO] [stderr]     |
[INFO] [stderr] 286 |             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stderr]     |                                                                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: this is dangerous because dereferencing the resulting pointer is undefined behavior
[INFO] [stderr]     = note: exposed provenance semantics can be used to create a pointer based on some previously exposed provenance
[INFO] [stderr]     = help: if you truly mean to create a pointer without provenance, use `std::ptr::without_provenance_mut`
[INFO] [stderr]     = help: for more information about transmute, see <https://doc.rust-lang.org/std/mem/fn.transmute.html#transmutation-between-pointers-and-integers>
[INFO] [stderr]     = help: for more information about exposed provenance, see <https://doc.rust-lang.org/std/ptr/index.html#exposed-provenance>
[INFO] [stderr] help: use `std::ptr::with_exposed_provenance_mut` instead to use a previously exposed provenance
[INFO] [stderr]     |
[INFO] [stderr] 286 -             let res: &mut Result<bool, sync::Error> = unsafe { mem::transmute(arg1) };
[INFO] [stderr] 286 +             let res: &mut Result<bool, sync::Error> = unsafe { &mut *std::ptr::with_exposed_provenance_mut::<Result<bool, sync::Error>>(arg1) };
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]   --> src/sched.rs:84:32
[INFO] [stderr]    |
[INFO] [stderr] 84 |     let sched = unsafe { &mut *SCHEDULER.as_mut_ptr() };
[INFO] [stderr]    |                                ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: `bern-kernel` (lib test) generated 68 warnings (run `cargo fix --lib -p bern-kernel --tests` to apply 6 suggestions)
[INFO] [stderr] warning: `bern-kernel` (lib) generated 27 warnings (26 duplicates)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 1.45s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/bern_kernel-8ffa4135d6ebc46f)
[INFO] [stdout] 
[INFO] [stdout] running 32 tests
[INFO] [stderr] 
[INFO] [stderr] thread 'alloc::heap::tests::alloc_and_dealloc' (57) panicked at src/alloc/heap.rs:67:21:
[INFO] [stderr] misaligned pointer dereference: address must be a multiple of 0x8 but is 0x606260fcaf5c
[INFO] [stderr] stack backtrace:
[INFO] [stderr]    0:     0x606260f9dc92 - std::backtrace_rs::backtrace::libunwind::trace::hcab59e1e990fdc24
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stderr]    1:     0x606260f9dc92 - std::backtrace_rs::backtrace::trace_unsynchronized::he24cc57f3d2f47b7
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stderr]    2:     0x606260f9dc92 - std::sys::backtrace::_print_fmt::hf8d65ede198eeb54
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/backtrace.rs:66:9
[INFO] [stderr]    3:     0x606260f9dc92 - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::h67edf0e4d33c343c
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/backtrace.rs:39:26
[INFO] [stderr]    4:     0x606260fadf0f - core::fmt::rt::Argument::fmt::hef94184842aeafdd
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/fmt/rt.rs:173:76
[INFO] [stderr]    5:     0x606260fadf0f - core::fmt::write::hcf0c66b48a8fa606
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/fmt/mod.rs:1468:25
[INFO] [stderr]    6:     0x606260f6af61 - std::io::default_write_fmt::h1ecb8c7cfa7da481
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/io/mod.rs:639:11
[INFO] [stderr]    7:     0x606260f6af61 - std::io::Write::write_fmt::h051fe4a9e4fdbf48
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/io/mod.rs:1954:13
[INFO] [stderr]    8:     0x606260f77262 - std::sys::backtrace::BacktraceLock::print::h07e5435aa717b414
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/backtrace.rs:42:9
[INFO] [stderr]    9:     0x606260f7bdaf - std::panicking::default_hook::{{closure}}::h91001850288db5f7
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:301:27
[INFO] [stderr]   10:     0x606260f7bc09 - std::panicking::default_hook::h2346dbb704ef5512
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:328:9
[INFO] [stderr]   11:     0x606260f3883e - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h18383b2e29377420
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/alloc/src/boxed.rs:1999:9
[INFO] [stderr]   12:     0x606260f3883e - test::test_main_with_exit_callback::{{closure}}::h272d7ef99aef06dc
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:145:21
[INFO] [stderr]   13:     0x606260f7c46f - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h6dba6e441651a0d1
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/alloc/src/boxed.rs:1999:9
[INFO] [stderr]   14:     0x606260f7c46f - std::panicking::panic_with_hook::hd2b063a6090d23a4
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:842:13
[INFO] [stderr]   15:     0x606260f7c2ca - std::panicking::panic_handler::{{closure}}::he666d95f139a333e
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:707:13
[INFO] [stderr]   16:     0x606260f77399 - std::sys::backtrace::__rust_end_short_backtrace::h631ad224854ebee5
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/backtrace.rs:174:18
[INFO] [stderr]   17:     0x606260f5f6dd - __rustc[1d67440d6e82e4f]::rust_begin_unwind
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:698:5
[INFO] [stderr]   18:     0x606260fb570d - core::panicking::panic_nounwind_fmt::runtime::hf619e8fd73995337
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/panicking.rs:117:22
[INFO] [stderr]   19:     0x606260fb570d - core::panicking::panic_nounwind_fmt::hc177e1bd7a48be0d
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/intrinsics/mod.rs:2435:9
[INFO] [stderr]   20:     0x606260fb5951 - core::panicking::panic_misaligned_pointer_dereference::h471f6de7a6940143
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/panicking.rs:284:5
[INFO] [stderr]   21:     0x606260f0cc0d - bern_kernel::alloc::heap::Heap::insert_free::hd8809ecc42fb91ca
[INFO] [stderr]                                at /opt/rustwide/workdir/src/alloc/heap.rs:67:21
[INFO] [stderr]   22:     0x606260f0ef1a - <bern_kernel::alloc::heap::Heap as bern_kernel::alloc::allocator::Allocator>::dealloc::h9ca2795cb3891a5f
[INFO] [stderr]                                at /opt/rustwide/workdir/src/alloc/heap.rs:167:14
[INFO] [stderr]   23:     0x606260f0524e - bern_kernel::alloc::heap::tests::alloc_and_dealloc::ha135fcf16d9b7b0e
[INFO] [stderr]                                at /opt/rustwide/workdir/src/alloc/heap.rs:235:26
[INFO] [stderr]   24:     0x606260f05277 - bern_kernel::alloc::heap::tests::alloc_and_dealloc::{{closure}}::hd4a63259b9f3c8f9
[INFO] [stderr]                                at /opt/rustwide/workdir/src/alloc/heap.rs:219:27
[INFO] [stderr]   25:     0x606260f00d26 - core::ops::function::FnOnce::call_once::h1b2e1b320e7fa7ac
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/ops/function.rs:250:5
[INFO] [stderr]   26:     0x606260f385fb - core::ops::function::FnOnce::call_once::h70887edf07a630ba
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/ops/function.rs:250:5
[INFO] [stderr]   27:     0x606260f385fb - test::__rust_begin_short_backtrace::h27763c4cbbdb8601
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:663:18
[INFO] [stderr]   28:     0x606260f4e265 - test::run_test_in_process::{{closure}}::h4dc8bc6d5e3924d3
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:686:74
[INFO] [stderr]   29:     0x606260f4e265 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h75905e8ffe81974f
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stderr]   30:     0x606260f4e265 - std::panicking::catch_unwind::do_call::h0bc60366ba66eba5
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:590:40
[INFO] [stderr]   31:     0x606260f4e265 - std::panicking::catch_unwind::hae1ec7bf94407afa
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:553:19
[INFO] [stderr]   32:     0x606260f4e265 - std::panic::catch_unwind::h0f4ff4773d84d3cd
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panic.rs:359:14
[INFO] [stderr]   33:     0x606260f4e265 - test::run_test_in_process::h03fbc77ae48b3f10
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:686:27
[INFO] [stderr]   34:     0x606260f4e265 - test::run_test::{{closure}}::h83476a9c453dc4d3
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:607:43
[INFO] [stderr]   35:     0x606260f24a54 - test::run_test::{{closure}}::h515482ad1e7fe7de
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/test/src/lib.rs:637:41
[INFO] [stderr]   36:     0x606260f24a54 - std::sys::backtrace::__rust_begin_short_backtrace::hed09f6ac5fe9d647
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/backtrace.rs:158:18
[INFO] [stderr]   37:     0x606260f2831a - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::h988e2cd969319888
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/thread/mod.rs:559:17
[INFO] [stderr]   38:     0x606260f2831a - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::hd70e28dc46ec20be
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stderr]   39:     0x606260f2831a - std::panicking::catch_unwind::do_call::hdc29e11311eb7655
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:590:40
[INFO] [stderr]   40:     0x606260f2831a - std::panicking::catch_unwind::h9e402d6a96fef41c
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panicking.rs:553:19
[INFO] [stderr]   41:     0x606260f2831a - std::panic::catch_unwind::h9213c0c54aec70e0
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/panic.rs:359:14
[INFO] [stderr]   42:     0x606260f2831a - std::thread::Builder::spawn_unchecked_::{{closure}}::h6262965869ed2b87
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/thread/mod.rs:557:30
[INFO] [stderr]   43:     0x606260f2831a - core::ops::function::FnOnce::call_once{{vtable.shim}}::h05c05ed02619e462
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/core/src/ops/function.rs:250:5
[INFO] [stderr]   44:     0x606260f724ff - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h2044e71c41d3958a
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/alloc/src/boxed.rs:1985:9
[INFO] [stderr]   45:     0x606260f724ff - std::sys::thread::unix::Thread::new::thread_start::hf277835320aa8e5a
[INFO] [stderr]                                at /rustc/bb624dcb4c8ab987e10c0808d92d76f3b84dd117/library/std/src/sys/thread/unix.rs:126:17
[INFO] [stderr]   46:     0x7b7e284e3aa4 - <unknown>
[INFO] [stderr]   47:     0x7b7e28570a34 - clone
[INFO] [stderr]   48:                0x0 - <unknown>
[INFO] [stderr] thread caused non-unwinding panic. aborting.
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] [stderr] 
[INFO] [stderr] Caused by:
[INFO] [stderr]   process didn't exit successfully: `/opt/rustwide/target/debug/deps/bern_kernel-8ffa4135d6ebc46f` (signal: 6, SIGABRT: process abort signal)
[INFO] running `Command { std: "docker" "inspect" "bd2cb7de9f34ba2d32d0e704d2a31573aa08609eefab394f4be75da24b7992c0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "bd2cb7de9f34ba2d32d0e704d2a31573aa08609eefab394f4be75da24b7992c0", kill_on_drop: false }`
[INFO] [stdout] bd2cb7de9f34ba2d32d0e704d2a31573aa08609eefab394f4be75da24b7992c0
