[INFO] fetching crate lv-std 0.0.2...
[INFO] testing lv-std-0.0.2 against 1.90.0 for beta-1.91-3
[INFO] extracting crate lv-std 0.0.2 into /workspace/builds/worker-0-tc1/source
[INFO] started tweaking crates.io crate lv-std 0.0.2
[INFO] finished tweaking crates.io crate lv-std 0.0.2
[INFO] tweaked toml for crates.io crate lv-std 0.0.2 written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate lv-std 0.0.2 on toolchain 1.90.0
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1.90.0" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate lv-std 0.0.2 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1.90.0" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded generic-array v1.2.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+1.90.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] c4e2f164d68c11256cb7aaae4c8771e82a28015599b068fc0b57e605883da7c9
[INFO] running `Command { std: "docker" "start" "-a" "c4e2f164d68c11256cb7aaae4c8771e82a28015599b068fc0b57e605883da7c9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "c4e2f164d68c11256cb7aaae4c8771e82a28015599b068fc0b57e605883da7c9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "c4e2f164d68c11256cb7aaae4c8771e82a28015599b068fc0b57e605883da7c9", kill_on_drop: false }`
[INFO] [stdout] c4e2f164d68c11256cb7aaae4c8771e82a28015599b068fc0b57e605883da7c9
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+1.90.0" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] a8207347952b23804e1c9714bed2122270000989f7d9d8a3bda89345f10bbe11
[INFO] running `Command { std: "docker" "start" "-a" "a8207347952b23804e1c9714bed2122270000989f7d9d8a3bda89345f10bbe11", kill_on_drop: false }`
[INFO] [stderr]    Compiling typenum v1.18.0
[INFO] [stderr]    Compiling generic-array v1.2.0
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.86s
[INFO] running `Command { std: "docker" "inspect" "a8207347952b23804e1c9714bed2122270000989f7d9d8a3bda89345f10bbe11", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "a8207347952b23804e1c9714bed2122270000989f7d9d8a3bda89345f10bbe11", kill_on_drop: false }`
[INFO] [stdout] a8207347952b23804e1c9714bed2122270000989f7d9d8a3bda89345f10bbe11
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+1.90.0" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] ec763e1f7457ce1e87c52a56dfe3c7ac96c2b37158e9a771b0b8e2cfa47f21c2
[INFO] running `Command { std: "docker" "start" "-a" "ec763e1f7457ce1e87c52a56dfe3c7ac96c2b37158e9a771b0b8e2cfa47f21c2", kill_on_drop: false }`
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `wide_null`
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stdout]     |
[INFO] [stdout] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stdout]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stdout]     |
[INFO] [stdout] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stdout]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_unsafe)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.54s
[INFO] running `Command { std: "docker" "inspect" "ec763e1f7457ce1e87c52a56dfe3c7ac96c2b37158e9a771b0b8e2cfa47f21c2", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "ec763e1f7457ce1e87c52a56dfe3c7ac96c2b37158e9a771b0b8e2cfa47f21c2", kill_on_drop: false }`
[INFO] [stdout] ec763e1f7457ce1e87c52a56dfe3c7ac96c2b37158e9a771b0b8e2cfa47f21c2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+1.90.0" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] ecb5c2291d3c86f73fdba39101ee98a89a82f8d337ac0a7edef240a24f38a1fd
[INFO] running `Command { std: "docker" "start" "-a" "ecb5c2291d3c86f73fdba39101ee98a89a82f8d337ac0a7edef240a24f38a1fd", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `GenericArray`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stderr]   |
[INFO] [stderr] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stderr]   |                     ^^^^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::marker::PhantomData`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::marker::PhantomData;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `typenum::assert_type_eq`
[INFO] [stderr]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use typenum::assert_type_eq;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::intrinsics::transmute`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::mem::transmute_copy`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::mem::transmute_copy;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |                      ^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(deprecated)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stderr]    |
[INFO] [stderr] 17 |         transmute(self)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stderr]    |
[INFO] [stderr] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stderr]    |
[INFO] [stderr] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stderr]    |
[INFO] [stderr] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stderr]    |
[INFO] [stderr] 42 |         transmute(raw)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stderr]    |
[INFO] [stderr] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stderr]    |
[INFO] [stderr] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stderr]    |
[INFO] [stderr] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stderr]    |
[INFO] [stderr] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stderr]    |
[INFO] [stderr] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stderr]    |
[INFO] [stderr] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stderr]    |
[INFO] [stderr] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stderr]    |
[INFO] [stderr] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stderr]    |
[INFO] [stderr] 73 |     pub unsafe fn free(self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stderr]    |
[INFO] [stderr] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stderr]    |
[INFO] [stderr] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stderr]    |
[INFO] [stderr] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stderr]    |
[INFO] [stderr] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stderr]    |
[INFO] [stderr] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stderr] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stderr]    | |_____________________________________________^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stderr]     |
[INFO] [stderr] 102 |         *self.ptr = value;
[INFO] [stderr]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |                          ----^^^^
[INFO] [stderr]     |                          |
[INFO] [stderr]     |                          help: remove this `mut`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_mut)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stderr]     |
[INFO] [stderr] 117 |             *self.ptr = value;
[INFO] [stderr]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |                                ----^^^^
[INFO] [stderr]     |                                |
[INFO] [stderr]     |                                help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stderr]     |
[INFO] [stderr] 134 |         self.ptr.as_ref()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stderr]     |
[INFO] [stderr] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stderr]     |
[INFO] [stderr] 139 |         self.ptr.as_mut()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |                                    ----^^^^
[INFO] [stderr]     |                                    |
[INFO] [stderr]     |                                    help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stderr]     |
[INFO] [stderr] 169 |         transmute(self)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stderr]     |
[INFO] [stderr] 174 |         transmute(self.ptr as *const U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stderr]     |
[INFO] [stderr] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stderr]     |
[INFO] [stderr] 179 |         transmute(self.ptr as *mut U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |                                         ----^^^^
[INFO] [stderr]     |                                         |
[INFO] [stderr]     |                                         help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stderr]     |
[INFO] [stderr] 184 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stderr]     |
[INFO] [stderr] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stderr]     |
[INFO] [stderr] 189 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stderr]     |
[INFO] [stderr] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stderr]     |
[INFO] [stderr] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: associated constant `NULL` is never used
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stderr]    |
[INFO] [stderr] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stderr]    | ---------------------------------- associated constant in this implementation
[INFO] [stderr] 21 |
[INFO] [stderr] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stderr]    |           ^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(dead_code)]` on by default
[INFO] [stderr] 
[INFO] [stderr] For more information about this error, try `rustc --explain E0133`.
[INFO] [stderr] warning: `lv-std` (lib) generated 40 warnings (run `cargo fix --lib -p lv-std` to apply 33 suggestions)
[INFO] [stderr] warning: unused variable: `wide_null`
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stderr]     |
[INFO] [stderr] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stderr]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_variables)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stderr]     |
[INFO] [stderr] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stderr]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_unsafe)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: `lv-std` (lib test) generated 41 warnings (39 duplicates)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.09s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/lv_std-cee19fe4164c0d55)
[INFO] [stdout] 
[INFO] [stdout] running 1 test
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] [stdout] test unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null ... FAILED
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null' panicked at src/unsafe_std/ptrs/raw_ptr.rs:203:9:
[INFO] [stdout] void is not allowed in this context
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x5b757fcdb882 - std::backtrace_rs::backtrace::libunwind::trace::h2d45396358f41939
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x5b757fcdb882 - std::backtrace_rs::backtrace::trace_unsynchronized::hffcefc0b67f1d6e2
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x5b757fcdb882 - std::sys::backtrace::_print_fmt::hd72f71d23b436b92
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/backtrace.rs:66:9
[INFO] [stdout]    3:     0x5b757fcdb882 - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::hdcfcb6d4c8489523
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/backtrace.rs:39:26
[INFO] [stdout]    4:     0x5b757fd00a83 - core::fmt::rt::Argument::fmt::h2c56b3114963061a
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/fmt/rt.rs:173:76
[INFO] [stdout]    5:     0x5b757fd00a83 - core::fmt::write::h8a494366950f23bb
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/fmt/mod.rs:1468:25
[INFO] [stdout]    6:     0x5b757fcd8803 - std::io::default_write_fmt::h7b8824096454f323
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/io/mod.rs:639:11
[INFO] [stdout]    7:     0x5b757fcd8803 - std::io::Write::write_fmt::h4e71294925c334d0
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/io/mod.rs:1954:13
[INFO] [stdout]    8:     0x5b757fcdb6d2 - std::sys::backtrace::BacktraceLock::print::hb2a626a81e06b2dc
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/backtrace.rs:42:9
[INFO] [stdout]    9:     0x5b757fcdcdf9 - std::panicking::default_hook::{{closure}}::h4f78485264f12d10
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:300:27
[INFO] [stdout]   10:     0x5b757fcdcc2e - std::panicking::default_hook::h2c66fc99e962531d
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:324:9
[INFO] [stdout]   11:     0x5b757fca5204 - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::hb6bd65493727d71a
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   12:     0x5b757fca5204 - test::test_main_with_exit_callback::{{closure}}::h60217ec76a0ece4a
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x5b757fcdd7ce - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h318e4efb8c1a5689
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   14:     0x5b757fcdd7ce - std::panicking::rust_panic_with_hook::h33ac55f64bbd807d
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:841:13
[INFO] [stdout]   15:     0x5b757fcdd566 - std::panicking::begin_panic_handler::{{closure}}::h30e7cb89678a57fe
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:699:13
[INFO] [stdout]   16:     0x5b757fcdbd79 - std::sys::backtrace::__rust_end_short_backtrace::hed60f27456c16ced
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/backtrace.rs:174:18
[INFO] [stdout]   17:     0x5b757fcdd22d - __rustc[de2ca18b4c54d5b8]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:697:5
[INFO] [stdout]   18:     0x5b757fcff570 - core::panicking::panic_fmt::h62f63d096dd276af
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/panicking.rs:75:14
[INFO] [stdout]   19:     0x5b757fc6bb8f - <lv_std::unsafe_std::ptrs::raw_ptr::RawPtr<T> as core::ops::deref::Deref>::deref::h77115cc2fe338efd
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/ptr_utils.rs:5:21
[INFO] [stdout]   20:     0x5b757fc6bb8f - lv_std::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::h8788c53646608976
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:258:33
[INFO] [stdout]   21:     0x5b757fc6bae7 - lv_std::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::{{closure}}::h4c7bb101a417b07a
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:254:26
[INFO] [stdout]   22:     0x5b757fc6aa86 - core::ops::function::FnOnce::call_once::hb41de2b99e26b245
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/ops/function.rs:253:5
[INFO] [stdout]   23:     0x5b757fcaaa6b - core::ops::function::FnOnce::call_once::h1f9474f1347fff52
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/ops/function.rs:253:5
[INFO] [stdout]   24:     0x5b757fcaaa6b - test::__rust_begin_short_backtrace::ha52ab26e77157f03
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:648:18
[INFO] [stdout]   25:     0x5b757fca9ba5 - test::run_test_in_process::{{closure}}::h229c1a11a50b261f
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:671:74
[INFO] [stdout]   26:     0x5b757fca9ba5 - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h78821afbf97b39a9
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   27:     0x5b757fca9ba5 - std::panicking::catch_unwind::do_call::h53abf3ed5bd32ba3
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:589:40
[INFO] [stdout]   28:     0x5b757fca9ba5 - std::panicking::catch_unwind::h6deb5fe1e91873c9
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:552:19
[INFO] [stdout]   29:     0x5b757fca9ba5 - std::panic::catch_unwind::hea0829b6b565654b
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panic.rs:359:14
[INFO] [stdout]   30:     0x5b757fca9ba5 - test::run_test_in_process::hdc44dfecea3db21b
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:671:27
[INFO] [stdout]   31:     0x5b757fca9ba5 - test::run_test::{{closure}}::h0364ba59bf23f652
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:592:43
[INFO] [stdout]   32:     0x5b757fc6d7a4 - test::run_test::{{closure}}::h32730b304eec05da
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/test/src/lib.rs:622:41
[INFO] [stdout]   33:     0x5b757fc6d7a4 - std::sys::backtrace::__rust_begin_short_backtrace::h177cb952fc54ad2c
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/backtrace.rs:158:18
[INFO] [stdout]   34:     0x5b757fc7117a - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::h119d903520007597
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/thread/mod.rs:559:17
[INFO] [stdout]   35:     0x5b757fc7117a - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::hab88401d606702a6
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   36:     0x5b757fc7117a - std::panicking::catch_unwind::do_call::h163fe12cca9901c2
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:589:40
[INFO] [stdout]   37:     0x5b757fc7117a - std::panicking::catch_unwind::he81557d0e17cc1bc
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panicking.rs:552:19
[INFO] [stdout]   38:     0x5b757fc7117a - std::panic::catch_unwind::hc2b8e79c20593955
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/panic.rs:359:14
[INFO] [stdout]   39:     0x5b757fc7117a - std::thread::Builder::spawn_unchecked_::{{closure}}::hfa6b4978e07815cc
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/thread/mod.rs:557:30
[INFO] [stdout]   40:     0x5b757fc7117a - core::ops::function::FnOnce::call_once{{vtable.shim}}::hddcd7484a13fd793
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/core/src/ops/function.rs:253:5
[INFO] [stdout]   41:     0x5b757fce074f - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h5924238c754de3b8
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/alloc/src/boxed.rs:1971:9
[INFO] [stdout]   42:     0x5b757fce074f - std::sys::pal::unix::thread::Thread::new::thread_start::hb6e99e73da4d28f8
[INFO] [stdout]                                at /rustc/1159e78c4747b02ef996e55082b704c09b970588/library/std/src/sys/pal/unix/thread.rs:107:17
[INFO] [stdout]   43:     0x770c353dfaa4 - <unknown>
[INFO] [stdout]   44:     0x770c3546ca34 - clone
[INFO] [stdout]   45:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 0 passed; 1 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.04s
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "ecb5c2291d3c86f73fdba39101ee98a89a82f8d337ac0a7edef240a24f38a1fd", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "ecb5c2291d3c86f73fdba39101ee98a89a82f8d337ac0a7edef240a24f38a1fd", kill_on_drop: false }`
[INFO] [stdout] ecb5c2291d3c86f73fdba39101ee98a89a82f8d337ac0a7edef240a24f38a1fd
