[INFO] fetching crate pyre-interpreter 0.0.1...
[INFO] testing pyre-interpreter-0.0.1 against beta-2026-04-21 for beta-1.96-2
[INFO] extracting crate pyre-interpreter 0.0.1 into /workspace/builds/worker-1-tc2/source
[INFO] started tweaking crates.io crate pyre-interpreter 0.0.1
[INFO] finished tweaking crates.io crate pyre-interpreter 0.0.1
[INFO] tweaked toml for crates.io crate pyre-interpreter 0.0.1 written to /workspace/builds/worker-1-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate pyre-interpreter 0.0.1 on toolchain beta-2026-04-21
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+beta-2026-04-21" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate pyre-interpreter 0.0.1 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+beta-2026-04-21" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2026-04-21" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] aef232b8ff0aa625e7956bf4c23a8c344b36285675b0ef6dd93093c0b5385938
[INFO] running `Command { std: "docker" "start" "-a" "aef232b8ff0aa625e7956bf4c23a8c344b36285675b0ef6dd93093c0b5385938", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "aef232b8ff0aa625e7956bf4c23a8c344b36285675b0ef6dd93093c0b5385938", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "aef232b8ff0aa625e7956bf4c23a8c344b36285675b0ef6dd93093c0b5385938", kill_on_drop: false }`
[INFO] [stdout] aef232b8ff0aa625e7956bf4c23a8c344b36285675b0ef6dd93093c0b5385938
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2026-04-21" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 511c1d7bd96090fc393062f7c3bdcd04a4814716de3b1f6c42f8d4083a94bb2e
[INFO] running `Command { std: "docker" "start" "-a" "511c1d7bd96090fc393062f7c3bdcd04a4814716de3b1f6c42f8d4083a94bb2e", kill_on_drop: false }`
[INFO] [stderr]    Compiling unicode-ident v1.0.24
[INFO] [stderr]    Compiling zerocopy v0.8.42
[INFO] [stderr]    Compiling libc v0.2.183
[INFO] [stderr]    Compiling smallvec v1.15.1
[INFO] [stderr]    Compiling collection_literals v1.0.3
[INFO] [stderr]    Compiling interpolator v0.5.0
[INFO] [stderr]    Compiling hashbrown v0.16.1
[INFO] [stderr]    Compiling itertools v0.14.0
[INFO] [stderr]    Compiling phf_shared v0.11.3
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling libm v0.2.16
[INFO] [stderr]    Compiling bytemuck v1.25.0
[INFO] [stderr]    Compiling malachite-nz v0.9.1
[INFO] [stderr]    Compiling castaway v0.2.4
[INFO] [stderr]    Compiling unicode-width v0.2.2
[INFO] [stderr]    Compiling regex-automata v0.4.14
[INFO] [stderr]    Compiling proc-macro2 v1.0.106
[INFO] [stderr]    Compiling compact_str v0.9.0
[INFO] [stderr]    Compiling safe_arch v1.0.0
[INFO] [stderr]    Compiling getopts v0.2.24
[INFO] [stderr]    Compiling phf v0.11.3
[INFO] [stderr]    Compiling ascii v1.1.0
[INFO] [stderr]    Compiling lexical-util v1.0.7
[INFO] [stderr]    Compiling quote v1.0.45
[INFO] [stderr]    Compiling indexmap v2.13.0
[INFO] [stderr]    Compiling toml_datetime v0.6.11
[INFO] [stderr]    Compiling syn v2.0.117
[INFO] [stderr]    Compiling proc-macro-utils v0.10.0
[INFO] [stderr]    Compiling ahash v0.8.12
[INFO] [stderr]    Compiling wide v1.1.1
[INFO] [stderr]    Compiling aho-corasick v1.1.4
[INFO] [stderr]    Compiling getrandom v0.2.17
[INFO] [stderr]    Compiling radium v1.1.1
[INFO] [stderr]    Compiling once_cell v1.21.4
[INFO] [stderr]    Compiling rand_core v0.6.4
[INFO] [stderr]    Compiling num-integer v0.1.46
[INFO] [stderr]    Compiling bstr v1.12.1
[INFO] [stderr]    Compiling num-complex v0.4.6
[INFO] [stderr]    Compiling toml_edit v0.19.15
[INFO] [stderr]    Compiling unic-ucd-category v0.9.0
[INFO] [stderr]    Compiling manyhow-macros v0.11.4
[INFO] [stderr]    Compiling lexical-parse-integer v1.0.6
[INFO] [stderr]    Compiling tinyvec v1.10.0
[INFO] [stderr]    Compiling syn v1.0.109
[INFO] [stderr]    Compiling lexical-parse-float v1.0.6
[INFO] [stderr]    Compiling hexf-parse v0.2.1
[INFO] [stderr]    Compiling optional v0.5.0
[INFO] [stderr]    Compiling unicode-normalization v0.1.25
[INFO] [stderr]    Compiling ordermap v1.1.0
[INFO] [stderr]    Compiling malachite-base v0.9.1
[INFO] [stderr]    Compiling rustpython-wtf8 v0.5.0
[INFO] [stderr]    Compiling getrandom v0.3.4
[INFO] [stderr]    Compiling proc-macro-crate v1.3.1
[INFO] [stderr]    Compiling num_enum_derive v0.5.11
[INFO] [stderr]    Compiling manyhow v0.11.4
[INFO] [stderr]    Compiling num_enum v0.5.11
[INFO] [stderr]    Compiling sre-engine v0.4.3
[INFO] [stderr]    Compiling quote-use-macros v0.8.4
[INFO] [stderr]    Compiling derive-where v1.6.0
[INFO] [stderr]    Compiling is-macro v0.3.7
[INFO] [stderr]    Compiling ref-cast-impl v1.0.25
[INFO] [stderr]    Compiling thiserror-impl v2.0.18
[INFO] [stderr]    Compiling rustpython-literal v0.5.0
[INFO] [stderr]    Compiling ref-cast v1.0.25
[INFO] [stderr]    Compiling bitflagset v0.0.3
[INFO] [stderr]    Compiling quote-use v0.8.4
[INFO] [stderr]    Compiling attribute-derive-macro v0.10.5
[INFO] [stderr]    Compiling ppv-lite86 v0.2.21
[INFO] [stderr]    Compiling rand_chacha v0.3.1
[INFO] [stderr]    Compiling rand v0.8.5
[INFO] [stderr]    Compiling thiserror v2.0.18
[INFO] [stderr]    Compiling attribute-derive v0.10.5
[INFO] [stderr]    Compiling phf_generator v0.11.3
[INFO] [stderr]    Compiling phf_codegen v0.11.3
[INFO] [stderr]    Compiling unicode_names2_generator v1.3.0
[INFO] [stderr]    Compiling unicode_names2_generator v2.0.0
[INFO] [stderr]    Compiling get-size-derive2 v0.7.4
[INFO] [stderr]    Compiling unicode_names2 v2.0.0
[INFO] [stderr]    Compiling unicode_names2 v1.3.0
[INFO] [stderr]    Compiling get-size2 v0.7.4
[INFO] [stderr]    Compiling rustpython-ruff_text_size v0.15.8
[INFO] [stderr]    Compiling rustpython-ruff_source_file v0.15.8
[INFO] [stderr]    Compiling rustpython-ruff_python_trivia v0.15.8
[INFO] [stderr]    Compiling rustpython-ruff_python_ast v0.15.8
[INFO] [stderr]    Compiling rustpython-ruff_python_parser v0.15.8
[INFO] [stderr]    Compiling malachite-bigint v0.9.1
[INFO] [stderr]    Compiling rustpython-compiler-core v0.5.0
[INFO] [stderr]    Compiling pyre-object v0.0.1
[INFO] [stderr]    Compiling pymath v0.2.0
[INFO] [stderr]    Compiling rustpython-codegen v0.5.0
[INFO] [stderr]    Compiling rustpython-compiler v0.5.0
[INFO] [stderr]    Compiling pyre-interpreter v0.0.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: type `W_Root` should have an upper camel case name
[INFO] [stdout]   --> src/baseobjspace.rs:26:10
[INFO] [stdout]    |
[INFO] [stdout] 26 | pub type W_Root = PyObjectRef;
[INFO] [stdout]    |          ^^^^^^ help: convert the identifier to upper camel case: `WRoot`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(non_camel_case_types)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_Check` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:80:12
[INFO] [stdout]    |
[INFO] [stdout] 80 | pub struct UnwrapSpec_Check {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecCheck`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitRun` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:91:12
[INFO] [stdout]    |
[INFO] [stdout] 91 | pub struct UnwrapSpec_EmitRun;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitRun`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitShortcut` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:94:12
[INFO] [stdout]    |
[INFO] [stdout] 94 | pub struct UnwrapSpec_EmitShortcut;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitShortcut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_FastFunc_Unwrap` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:97:12
[INFO] [stdout]    |
[INFO] [stdout] 97 | pub struct UnwrapSpec_FastFunc_Unwrap;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecFastFuncUnwrap`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `is_int` and `w_dict_setitem`
[INFO] [stdout]  --> src/runtime_ops.rs:6:55
[INFO] [stdout]   |
[INFO] [stdout] 6 |     PY_NULL, PyObjectRef, W_SeqIterator, is_instance, is_int, is_list, is_range_iter, is_seq_iter,
[INFO] [stdout]   |                                                       ^^^^^^
[INFO] [stdout] 7 |     is_str, is_tuple, w_dict_new, w_dict_setitem, w_dict_store, w_int_get_value, w_int_new,
[INFO] [stdout]   |                                   ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PyErrorKind`
[INFO] [stdout]   --> src/call.rs:10:14
[INFO] [stdout]    |
[INFO] [stdout] 10 |     PyError, PyErrorKind, PyNamespace, PyResult, builtin_code_get, dispatch_callable,
[INFO] [stdout]    |              ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `StrDrive`
[INFO] [stdout]  --> src/module/_sre/moduledef.rs:7:42
[INFO] [stdout]   |
[INFO] [stdout] 7 | use sre_engine::engine::{Request, State, StrDrive};
[INFO] [stdout]   |                                          ^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `is_w` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `is_w` in the value namespace is also re-exported here
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(ambiguous_glob_reexports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call_obj_args` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call_obj_args` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable statement
[INFO] [stdout]     --> src/eval.rs:1224:9
[INFO] [stdout]      |
[INFO] [stdout] 1219 |         return Ok(());
[INFO] [stdout]      |         ------------- any code following this expression is unreachable
[INFO] [stdout] ...
[INFO] [stdout] 1224 |         let code = self.code;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^ unreachable statement
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]     --> src/baseobjspace.rs:3192:5
[INFO] [stdout]      |
[INFO] [stdout] 3192 |     unsafe {
[INFO] [stdout]      |     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_type` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:685:29
[INFO] [stdout]     |
[INFO] [stdout] 685 |     if w_type.is_null() || !is_type(w_type) {
[INFO] [stdout]     |                             ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/builtins.rs:684:1
[INFO] [stdout]     |
[INFO] [stdout] 684 | unsafe fn issubtype_w(w_type: PyObjectRef, cls: PyObjectRef) -> bool {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_type_get_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:689:19
[INFO] [stdout]     |
[INFO] [stdout] 689 |     let mro_ptr = w_type_get_mro(w_type);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:691:16
[INFO] [stdout]     |
[INFO] [stdout] 691 |         return (*mro_ptr).iter().any(|&t| std::ptr::eq(t, cls));
[INFO] [stdout]     |                ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `baseobjspace::compute_default_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:694:5
[INFO] [stdout]     |
[INFO] [stdout] 694 |     crate::baseobjspace::compute_default_mro(w_type)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:162:14
[INFO] [stdout]     |
[INFO] [stdout] 162 |     let tp = (*obj).ob_type;
[INFO] [stdout]     |              ^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/display.rs:157:1
[INFO] [stdout]     |
[INFO] [stdout] 157 | pub unsafe fn py_str(obj: PyObjectRef) -> String {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_str_get_value` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:165:16
[INFO] [stdout]     |
[INFO] [stdout] 165 |         return pyre_object::w_str_get_value(obj).to_string();
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `display::py_repr` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:175:5
[INFO] [stdout]     |
[INFO] [stdout] 175 |     py_repr(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_kind` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:169:20
[INFO] [stdout]     |
[INFO] [stdout] 169 |         let kind = pyre_object::excobject::w_exception_get_kind(obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/error.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub unsafe fn from_exc_object(obj: PyObjectRef) -> Self {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_message` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:170:23
[INFO] [stdout]     |
[INFO] [stdout] 170 |         let message = pyre_object::excobject::w_exception_get_message(obj).to_string();
[INFO] [stdout]     |                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:295:21
[INFO] [stdout]     |
[INFO] [stdout] 289 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 295 |                 if !unsafe { (&*next).hide() } {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:378:21
[INFO] [stdout]     |
[INFO] [stdout] 378 |                     unsafe {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:111:1
[INFO] [stdout]     |
[INFO] [stdout] 111 | pub unsafe fn getcode(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:141:28
[INFO] [stdout]     |
[INFO] [stdout] 141 |     pyre_object::w_str_new(function_get_name(obj))
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:140:1
[INFO] [stdout]     |
[INFO] [stdout] 140 | pub unsafe fn fget_func_name(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_getdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:211:5
[INFO] [stdout]     |
[INFO] [stdout] 211 |     function_getdict(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:210:1
[INFO] [stdout]     |
[INFO] [stdout] 210 | pub unsafe fn getdict(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_setdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:217:5
[INFO] [stdout]     |
[INFO] [stdout] 217 |     function_setdict(obj, value)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:216:1
[INFO] [stdout]     |
[INFO] [stdout] 216 | pub unsafe fn setdict(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:241:17
[INFO] [stdout]     |
[INFO] [stdout] 241 |     let value = function_get_defaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:240:1
[INFO] [stdout]     |
[INFO] [stdout] 240 | pub unsafe fn fget_func_defaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:253:9
[INFO] [stdout]     |
[INFO] [stdout] 253 |         function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:251:1
[INFO] [stdout]     |
[INFO] [stdout] 251 | pub unsafe fn fset_func_defaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:255:9
[INFO] [stdout]     |
[INFO] [stdout] 255 |         function_set_defaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:262:5
[INFO] [stdout]     |
[INFO] [stdout] 262 |     function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:261:1
[INFO] [stdout]     |
[INFO] [stdout] 261 | pub unsafe fn fdel_func_defaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:268:17
[INFO] [stdout]     |
[INFO] [stdout] 268 |     let value = function_get_kwdefaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:267:1
[INFO] [stdout]     |
[INFO] [stdout] 267 | pub unsafe fn fget_func_kwdefaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:280:9
[INFO] [stdout]     |
[INFO] [stdout] 280 |         function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:278:1
[INFO] [stdout]     |
[INFO] [stdout] 278 | pub unsafe fn fset_func_kwdefaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:282:9
[INFO] [stdout]     |
[INFO] [stdout] 282 |         function_set_kwdefaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:289:5
[INFO] [stdout]     |
[INFO] [stdout] 289 |     function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:288:1
[INFO] [stdout]     |
[INFO] [stdout] 288 | pub unsafe fn fdel_func_kwdefaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:295:5
[INFO] [stdout]     |
[INFO] [stdout] 295 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:294:1
[INFO] [stdout]     |
[INFO] [stdout] 294 | pub unsafe fn function_get_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:301:5
[INFO] [stdout]     |
[INFO] [stdout] 301 |     (*(obj as *mut Function)).code = code;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:300:1
[INFO] [stdout]     |
[INFO] [stdout] 300 | pub unsafe fn function_set_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:307:5
[INFO] [stdout]     |
[INFO] [stdout] 307 |     function_get_name(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:306:1
[INFO] [stdout]     |
[INFO] [stdout] 306 | pub unsafe fn function_get_func_name(obj: PyObjectRef) -> &'static str {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_str` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:313:9
[INFO] [stdout]     |
[INFO] [stdout] 313 |     if !pyre_object::is_str(name) {
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:312:1
[INFO] [stdout]     |
[INFO] [stdout] 312 | pub unsafe fn function_set_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:318:15
[INFO] [stdout]     |
[INFO] [stdout] 318 |     let old = (*(obj as *mut Function)).name;
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:320:14
[INFO] [stdout]     |
[INFO] [stdout] 320 |         drop(Box::from_raw(old as *mut String));
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:322:5
[INFO] [stdout]     |
[INFO] [stdout] 322 |     (*(obj as *mut Function)).name = name;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:328:5
[INFO] [stdout]     |
[INFO] [stdout] 328 |     function_set_func_name(obj, name)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:327:1
[INFO] [stdout]     |
[INFO] [stdout] 327 | pub unsafe fn fset_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:338:5
[INFO] [stdout]     |
[INFO] [stdout] 338 |     function_get_globals(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:337:1
[INFO] [stdout]     |
[INFO] [stdout] 337 | pub unsafe fn function_get_w_globals(obj: PyObjectRef) -> *mut PyNamespace {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:344:5
[INFO] [stdout]     |
[INFO] [stdout] 344 |     (*(obj as *mut Function)).w_func_globals = globals;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:343:1
[INFO] [stdout]     |
[INFO] [stdout] 343 | pub unsafe fn function_set_w_globals(obj: PyObjectRef, globals: *mut PyNamespace) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::_check_code_mutable` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:350:5
[INFO] [stdout]     |
[INFO] [stdout] 350 |     _check_code_mutable(obj, "func_code");
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:349:1
[INFO] [stdout]     |
[INFO] [stdout] 349 | pub unsafe fn fset_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:351:5
[INFO] [stdout]     |
[INFO] [stdout] 351 |     function_set_func_code(obj, code);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:357:5
[INFO] [stdout]     |
[INFO] [stdout] 357 |     function_get_closure(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:356:1
[INFO] [stdout]     |
[INFO] [stdout] 356 | pub unsafe fn function_get_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_func_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:363:17
[INFO] [stdout]     |
[INFO] [stdout] 363 |     let value = function_get_func_closure(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:362:1
[INFO] [stdout]     |
[INFO] [stdout] 362 | pub unsafe fn fget_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:374:5
[INFO] [stdout]     |
[INFO] [stdout] 374 |     function_set_closure(obj, closure);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:373:1
[INFO] [stdout]     |
[INFO] [stdout] 373 | pub unsafe fn fset_func_closure(obj: PyObjectRef, closure: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:380:19
[INFO] [stdout]     |
[INFO] [stdout] 380 |     let globals = function_get_globals(obj);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:379:1
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_none` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:403:41
[INFO] [stdout]     |
[INFO] [stdout] 403 |     let name = if !w_name.is_null() && !pyre_object::is_none(w_name) {
[INFO] [stdout]     |                                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:395:1
[INFO] [stdout]     |
[INFO] [stdout] 395 | / pub unsafe fn descr_function__new__(
[INFO] [stdout] 396 | |     code: *const (),
[INFO] [stdout] 397 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 398 | |     w_name: PyObjectRef,
[INFO] [stdout] 399 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 400 | |     w_closure: PyObjectRef,
[INFO] [stdout] 401 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::descr_function__new__` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:438:5
[INFO] [stdout]     |
[INFO] [stdout] 438 |     descr_function__new__(code, w_globals, w_name, _argdefs, w_closure)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:431:1
[INFO] [stdout]     |
[INFO] [stdout] 431 | / pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout] 432 | |     code: *const (),
[INFO] [stdout] 433 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 434 | |     w_name: PyObjectRef,
[INFO] [stdout] 435 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 436 | |     w_closure: PyObjectRef,
[INFO] [stdout] 437 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_classmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:506:20
[INFO] [stdout]     |
[INFO] [stdout] 506 |         let func = pyre_object::w_classmethod_get_func(w_obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:497:1
[INFO] [stdout]     |
[INFO] [stdout] 497 | / pub unsafe fn descr_classmethod_get(
[INFO] [stdout] 498 | |     w_obj: PyObjectRef,
[INFO] [stdout] 499 | |     obj: PyObjectRef,
[INFO] [stdout] 500 | |     w_cls: PyObjectRef,
[INFO] [stdout] 501 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_staticmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:539:9
[INFO] [stdout]     |
[INFO] [stdout] 539 |         pyre_object::w_staticmethod_get_func(obj)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:530:1
[INFO] [stdout]     |
[INFO] [stdout] 530 | / pub unsafe fn descr_staticmethod_get(
[INFO] [stdout] 531 | |     obj: PyObjectRef,
[INFO] [stdout] 532 | |     _obj: PyObjectRef,
[INFO] [stdout] 533 | |     _cls: PyObjectRef,
[INFO] [stdout] 534 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:651:16
[INFO] [stdout]     |
[INFO] [stdout] 651 |     let name = function_get_name(obj);
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:650:1
[INFO] [stdout]     |
[INFO] [stdout] 650 | pub unsafe fn descr_function_repr(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:658:5
[INFO] [stdout]     |
[INFO] [stdout] 658 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:657:1
[INFO] [stdout]     |
[INFO] [stdout] 657 | pub unsafe fn fget_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1522:9
[INFO] [stdout]      |
[INFO] [stdout] 1497 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ------------------------------ matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1522 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_patterns)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1712:9
[INFO] [stdout]      |
[INFO] [stdout] 1340 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ----------------------- matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1712 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:358:30
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] 357 |                 (&*code).varnames.len()
[INFO] [stdout] 358 |                     + ncells(unsafe { &*code })
[INFO] [stdout]     |                              ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:359:23
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 359 |                     + unsafe { (&*code).max_stackdepth as usize }
[INFO] [stdout]     |                       ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:363:74
[INFO] [stdout]     |
[INFO] [stdout] 363 |         self.valuestackdepth = unsafe { (&*code).varnames.len() + ncells(unsafe { &*code }) };
[INFO] [stdout]     |                                ------                                    ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                because it's nested under this `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: useless assignment of field of type `*mut pyframe::PyFrame` to itself
[INFO] [stdout]    --> src/executioncontext.rs:379:25
[INFO] [stdout]     |
[INFO] [stdout] 379 |                         self.topframeref = self.topframeref;
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `fromcache` is never read
[INFO] [stdout]    --> src/baseobjspace.rs:107:5
[INFO] [stdout]     |
[INFO] [stdout] 106 | pub struct ObjSpace {
[INFO] [stdout]     |            -------- field in this struct
[INFO] [stdout] 107 |     fromcache: Option<PyObjectRef>,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `ObjSpace` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_staticmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:790:4
[INFO] [stdout]     |
[INFO] [stdout] 790 | fn builtin_staticmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_classmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:801:4
[INFO] [stdout]     |
[INFO] [stdout] 801 | fn builtin_classmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_object` is never used
[INFO] [stdout]     --> src/builtins.rs:1174:4
[INFO] [stdout]      |
[INFO] [stdout] 1174 | fn builtin_object(_args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]      |    ^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `is_builtin_code` is never used
[INFO] [stdout]    --> src/function.rs:476:4
[INFO] [stdout]     |
[INFO] [stdout] 476 | fn is_builtin_code(obj: PyObjectRef) -> bool {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `function_call_obj_args` is never used
[INFO] [stdout]    --> src/function.rs:710:15
[INFO] [stdout]     |
[INFO] [stdout] 710 | pub(crate) fn function_call_obj_args(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `init_collections_abc` is never used
[INFO] [stdout]    --> src/importing.rs:123:4
[INFO] [stdout]     |
[INFO] [stdout] 123 | fn init_collections_abc(ns: &mut PyNamespace) {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `is_in_line_tracing`, `instr_lb`, `instr_ub`, and `instr_prev_plus_one` are never read
[INFO] [stdout]    --> src/pyframe.rs:102:5
[INFO] [stdout]     |
[INFO] [stdout]  97 | pub struct FrameDebugData {
[INFO] [stdout]     |            -------------- fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 102 |     is_in_line_tracing: bool,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 103 |     instr_lb: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 104 |     instr_ub: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 105 |     instr_prev_plus_one: usize,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `FrameDebugData` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fget___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:379:15
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fget_module`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:395:15
[INFO] [stdout]     |
[INFO] [stdout] 395 | pub unsafe fn descr_function__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fset___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:418:15
[INFO] [stdout]     |
[INFO] [stdout] 418 | pub unsafe fn fset___module__(_obj: PyObjectRef, _value: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fset_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fdel___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:422:15
[INFO] [stdout]     |
[INFO] [stdout] 422 | pub unsafe fn fdel___module__(_obj: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fdel_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_builtinfunction__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:431:15
[INFO] [stdout]     |
[INFO] [stdout] 431 | pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_builtinfunction_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_classmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:484:15
[INFO] [stdout]     |
[INFO] [stdout] 484 | pub unsafe fn descr_classmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_classmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_staticmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:517:15
[INFO] [stdout]     |
[INFO] [stdout] 517 | pub unsafe fn descr_staticmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_staticmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:544:15
[INFO] [stdout]     |
[INFO] [stdout] 544 | pub unsafe fn descr_method__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:613:15
[INFO] [stdout]     |
[INFO] [stdout] 613 | pub unsafe fn descr_method__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:663:8
[INFO] [stdout]     |
[INFO] [stdout] 663 | pub fn descr_function__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__setstate__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:672:8
[INFO] [stdout]     |
[INFO] [stdout] 672 | pub fn descr_function__setstate__(_obj: PyObjectRef, _state: PyObjectRef) {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__reduce__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:764:12
[INFO] [stdout]     |
[INFO] [stdout] 764 |     pub fn descr__reduce__(&self) -> PyObjectRef {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__setstate__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:774:12
[INFO] [stdout]     |
[INFO] [stdout] 774 |     pub fn descr__setstate__(&mut self, _state: PyObjectRef) {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 21s
[INFO] running `Command { std: "docker" "inspect" "511c1d7bd96090fc393062f7c3bdcd04a4814716de3b1f6c42f8d4083a94bb2e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "511c1d7bd96090fc393062f7c3bdcd04a4814716de3b1f6c42f8d4083a94bb2e", kill_on_drop: false }`
[INFO] [stdout] 511c1d7bd96090fc393062f7c3bdcd04a4814716de3b1f6c42f8d4083a94bb2e
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2026-04-21" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] b7c831617b8d042e82a5e70dd9d471b773c76fa5b4cfb34fd974486cfcab0ee2
[INFO] running `Command { std: "docker" "start" "-a" "b7c831617b8d042e82a5e70dd9d471b773c76fa5b4cfb34fd974486cfcab0ee2", kill_on_drop: false }`
[INFO] [stdout] warning: type `W_Root` should have an upper camel case name
[INFO] [stdout]   --> src/baseobjspace.rs:26:10
[INFO] [stdout]    |
[INFO] [stdout] 26 | pub type W_Root = PyObjectRef;
[INFO] [stdout]    |          ^^^^^^ help: convert the identifier to upper camel case: `WRoot`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(non_camel_case_types)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_Check` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:80:12
[INFO] [stdout]    |
[INFO] [stdout] 80 | pub struct UnwrapSpec_Check {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecCheck`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitRun` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:91:12
[INFO] [stdout]    |
[INFO] [stdout] 91 | pub struct UnwrapSpec_EmitRun;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitRun`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitShortcut` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:94:12
[INFO] [stdout]    |
[INFO] [stdout] 94 | pub struct UnwrapSpec_EmitShortcut;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitShortcut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_FastFunc_Unwrap` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:97:12
[INFO] [stdout]    |
[INFO] [stdout] 97 | pub struct UnwrapSpec_FastFunc_Unwrap;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecFastFuncUnwrap`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `is_int` and `w_dict_setitem`
[INFO] [stdout]  --> src/runtime_ops.rs:6:55
[INFO] [stdout]   |
[INFO] [stdout] 6 |     PY_NULL, PyObjectRef, W_SeqIterator, is_instance, is_int, is_list, is_range_iter, is_seq_iter,
[INFO] [stdout]   |                                                       ^^^^^^
[INFO] [stdout] 7 |     is_str, is_tuple, w_dict_new, w_dict_setitem, w_dict_store, w_int_get_value, w_int_new,
[INFO] [stdout]   |                                   ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PyErrorKind`
[INFO] [stdout]   --> src/call.rs:10:14
[INFO] [stdout]    |
[INFO] [stdout] 10 |     PyError, PyErrorKind, PyNamespace, PyResult, builtin_code_get, dispatch_callable,
[INFO] [stdout]    |              ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `StrDrive`
[INFO] [stdout]  --> src/module/_sre/moduledef.rs:7:42
[INFO] [stdout]   |
[INFO] [stdout] 7 | use sre_engine::engine::{Request, State, StrDrive};
[INFO] [stdout]   |                                          ^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `is_w` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `is_w` in the value namespace is also re-exported here
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(ambiguous_glob_reexports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call_obj_args` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call_obj_args` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable statement
[INFO] [stdout]     --> src/eval.rs:1224:9
[INFO] [stdout]      |
[INFO] [stdout] 1219 |         return Ok(());
[INFO] [stdout]      |         ------------- any code following this expression is unreachable
[INFO] [stdout] ...
[INFO] [stdout] 1224 |         let code = self.code;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^ unreachable statement
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]     --> src/baseobjspace.rs:3192:5
[INFO] [stdout]      |
[INFO] [stdout] 3192 |     unsafe {
[INFO] [stdout]      |     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_type` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:685:29
[INFO] [stdout]     |
[INFO] [stdout] 685 |     if w_type.is_null() || !is_type(w_type) {
[INFO] [stdout]     |                             ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/builtins.rs:684:1
[INFO] [stdout]     |
[INFO] [stdout] 684 | unsafe fn issubtype_w(w_type: PyObjectRef, cls: PyObjectRef) -> bool {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_type_get_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:689:19
[INFO] [stdout]     |
[INFO] [stdout] 689 |     let mro_ptr = w_type_get_mro(w_type);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:691:16
[INFO] [stdout]     |
[INFO] [stdout] 691 |         return (*mro_ptr).iter().any(|&t| std::ptr::eq(t, cls));
[INFO] [stdout]     |                ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `baseobjspace::compute_default_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:694:5
[INFO] [stdout]     |
[INFO] [stdout] 694 |     crate::baseobjspace::compute_default_mro(w_type)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:162:14
[INFO] [stdout]     |
[INFO] [stdout] 162 |     let tp = (*obj).ob_type;
[INFO] [stdout]     |              ^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/display.rs:157:1
[INFO] [stdout]     |
[INFO] [stdout] 157 | pub unsafe fn py_str(obj: PyObjectRef) -> String {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_str_get_value` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:165:16
[INFO] [stdout]     |
[INFO] [stdout] 165 |         return pyre_object::w_str_get_value(obj).to_string();
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `display::py_repr` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:175:5
[INFO] [stdout]     |
[INFO] [stdout] 175 |     py_repr(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_kind` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:169:20
[INFO] [stdout]     |
[INFO] [stdout] 169 |         let kind = pyre_object::excobject::w_exception_get_kind(obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/error.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub unsafe fn from_exc_object(obj: PyObjectRef) -> Self {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_message` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:170:23
[INFO] [stdout]     |
[INFO] [stdout] 170 |         let message = pyre_object::excobject::w_exception_get_message(obj).to_string();
[INFO] [stdout]     |                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:295:21
[INFO] [stdout]     |
[INFO] [stdout] 289 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 295 |                 if !unsafe { (&*next).hide() } {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:378:21
[INFO] [stdout]     |
[INFO] [stdout] 378 |                     unsafe {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:111:1
[INFO] [stdout]     |
[INFO] [stdout] 111 | pub unsafe fn getcode(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:141:28
[INFO] [stdout]     |
[INFO] [stdout] 141 |     pyre_object::w_str_new(function_get_name(obj))
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:140:1
[INFO] [stdout]     |
[INFO] [stdout] 140 | pub unsafe fn fget_func_name(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_getdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:211:5
[INFO] [stdout]     |
[INFO] [stdout] 211 |     function_getdict(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:210:1
[INFO] [stdout]     |
[INFO] [stdout] 210 | pub unsafe fn getdict(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_setdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:217:5
[INFO] [stdout]     |
[INFO] [stdout] 217 |     function_setdict(obj, value)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:216:1
[INFO] [stdout]     |
[INFO] [stdout] 216 | pub unsafe fn setdict(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:241:17
[INFO] [stdout]     |
[INFO] [stdout] 241 |     let value = function_get_defaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:240:1
[INFO] [stdout]     |
[INFO] [stdout] 240 | pub unsafe fn fget_func_defaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:253:9
[INFO] [stdout]     |
[INFO] [stdout] 253 |         function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:251:1
[INFO] [stdout]     |
[INFO] [stdout] 251 | pub unsafe fn fset_func_defaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:255:9
[INFO] [stdout]     |
[INFO] [stdout] 255 |         function_set_defaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:262:5
[INFO] [stdout]     |
[INFO] [stdout] 262 |     function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:261:1
[INFO] [stdout]     |
[INFO] [stdout] 261 | pub unsafe fn fdel_func_defaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:268:17
[INFO] [stdout]     |
[INFO] [stdout] 268 |     let value = function_get_kwdefaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:267:1
[INFO] [stdout]     |
[INFO] [stdout] 267 | pub unsafe fn fget_func_kwdefaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:280:9
[INFO] [stdout]     |
[INFO] [stdout] 280 |         function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:278:1
[INFO] [stdout]     |
[INFO] [stdout] 278 | pub unsafe fn fset_func_kwdefaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:282:9
[INFO] [stdout]     |
[INFO] [stdout] 282 |         function_set_kwdefaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:289:5
[INFO] [stdout]     |
[INFO] [stdout] 289 |     function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:288:1
[INFO] [stdout]     |
[INFO] [stdout] 288 | pub unsafe fn fdel_func_kwdefaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:295:5
[INFO] [stdout]     |
[INFO] [stdout] 295 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:294:1
[INFO] [stdout]     |
[INFO] [stdout] 294 | pub unsafe fn function_get_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:301:5
[INFO] [stdout]     |
[INFO] [stdout] 301 |     (*(obj as *mut Function)).code = code;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:300:1
[INFO] [stdout]     |
[INFO] [stdout] 300 | pub unsafe fn function_set_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:307:5
[INFO] [stdout]     |
[INFO] [stdout] 307 |     function_get_name(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:306:1
[INFO] [stdout]     |
[INFO] [stdout] 306 | pub unsafe fn function_get_func_name(obj: PyObjectRef) -> &'static str {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_str` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:313:9
[INFO] [stdout]     |
[INFO] [stdout] 313 |     if !pyre_object::is_str(name) {
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:312:1
[INFO] [stdout]     |
[INFO] [stdout] 312 | pub unsafe fn function_set_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:318:15
[INFO] [stdout]     |
[INFO] [stdout] 318 |     let old = (*(obj as *mut Function)).name;
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:320:14
[INFO] [stdout]     |
[INFO] [stdout] 320 |         drop(Box::from_raw(old as *mut String));
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:322:5
[INFO] [stdout]     |
[INFO] [stdout] 322 |     (*(obj as *mut Function)).name = name;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:328:5
[INFO] [stdout]     |
[INFO] [stdout] 328 |     function_set_func_name(obj, name)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:327:1
[INFO] [stdout]     |
[INFO] [stdout] 327 | pub unsafe fn fset_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:338:5
[INFO] [stdout]     |
[INFO] [stdout] 338 |     function_get_globals(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:337:1
[INFO] [stdout]     |
[INFO] [stdout] 337 | pub unsafe fn function_get_w_globals(obj: PyObjectRef) -> *mut PyNamespace {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:344:5
[INFO] [stdout]     |
[INFO] [stdout] 344 |     (*(obj as *mut Function)).w_func_globals = globals;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:343:1
[INFO] [stdout]     |
[INFO] [stdout] 343 | pub unsafe fn function_set_w_globals(obj: PyObjectRef, globals: *mut PyNamespace) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::_check_code_mutable` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:350:5
[INFO] [stdout]     |
[INFO] [stdout] 350 |     _check_code_mutable(obj, "func_code");
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:349:1
[INFO] [stdout]     |
[INFO] [stdout] 349 | pub unsafe fn fset_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:351:5
[INFO] [stdout]     |
[INFO] [stdout] 351 |     function_set_func_code(obj, code);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:357:5
[INFO] [stdout]     |
[INFO] [stdout] 357 |     function_get_closure(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:356:1
[INFO] [stdout]     |
[INFO] [stdout] 356 | pub unsafe fn function_get_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_func_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:363:17
[INFO] [stdout]     |
[INFO] [stdout] 363 |     let value = function_get_func_closure(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:362:1
[INFO] [stdout]     |
[INFO] [stdout] 362 | pub unsafe fn fget_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:374:5
[INFO] [stdout]     |
[INFO] [stdout] 374 |     function_set_closure(obj, closure);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:373:1
[INFO] [stdout]     |
[INFO] [stdout] 373 | pub unsafe fn fset_func_closure(obj: PyObjectRef, closure: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:380:19
[INFO] [stdout]     |
[INFO] [stdout] 380 |     let globals = function_get_globals(obj);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:379:1
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_none` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:403:41
[INFO] [stdout]     |
[INFO] [stdout] 403 |     let name = if !w_name.is_null() && !pyre_object::is_none(w_name) {
[INFO] [stdout]     |                                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:395:1
[INFO] [stdout]     |
[INFO] [stdout] 395 | / pub unsafe fn descr_function__new__(
[INFO] [stdout] 396 | |     code: *const (),
[INFO] [stdout] 397 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 398 | |     w_name: PyObjectRef,
[INFO] [stdout] 399 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 400 | |     w_closure: PyObjectRef,
[INFO] [stdout] 401 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::descr_function__new__` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:438:5
[INFO] [stdout]     |
[INFO] [stdout] 438 |     descr_function__new__(code, w_globals, w_name, _argdefs, w_closure)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:431:1
[INFO] [stdout]     |
[INFO] [stdout] 431 | / pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout] 432 | |     code: *const (),
[INFO] [stdout] 433 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 434 | |     w_name: PyObjectRef,
[INFO] [stdout] 435 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 436 | |     w_closure: PyObjectRef,
[INFO] [stdout] 437 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_classmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:506:20
[INFO] [stdout]     |
[INFO] [stdout] 506 |         let func = pyre_object::w_classmethod_get_func(w_obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:497:1
[INFO] [stdout]     |
[INFO] [stdout] 497 | / pub unsafe fn descr_classmethod_get(
[INFO] [stdout] 498 | |     w_obj: PyObjectRef,
[INFO] [stdout] 499 | |     obj: PyObjectRef,
[INFO] [stdout] 500 | |     w_cls: PyObjectRef,
[INFO] [stdout] 501 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_staticmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:539:9
[INFO] [stdout]     |
[INFO] [stdout] 539 |         pyre_object::w_staticmethod_get_func(obj)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:530:1
[INFO] [stdout]     |
[INFO] [stdout] 530 | / pub unsafe fn descr_staticmethod_get(
[INFO] [stdout] 531 | |     obj: PyObjectRef,
[INFO] [stdout] 532 | |     _obj: PyObjectRef,
[INFO] [stdout] 533 | |     _cls: PyObjectRef,
[INFO] [stdout] 534 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling pyre-interpreter v0.0.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:651:16
[INFO] [stdout]     |
[INFO] [stdout] 651 |     let name = function_get_name(obj);
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:650:1
[INFO] [stdout]     |
[INFO] [stdout] 650 | pub unsafe fn descr_function_repr(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:658:5
[INFO] [stdout]     |
[INFO] [stdout] 658 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:657:1
[INFO] [stdout]     |
[INFO] [stdout] 657 | pub unsafe fn fget_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1522:9
[INFO] [stdout]      |
[INFO] [stdout] 1497 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ------------------------------ matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1522 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_patterns)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1712:9
[INFO] [stdout]      |
[INFO] [stdout] 1340 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ----------------------- matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1712 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:358:30
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] 357 |                 (&*code).varnames.len()
[INFO] [stdout] 358 |                     + ncells(unsafe { &*code })
[INFO] [stdout]     |                              ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:359:23
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 359 |                     + unsafe { (&*code).max_stackdepth as usize }
[INFO] [stdout]     |                       ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:363:74
[INFO] [stdout]     |
[INFO] [stdout] 363 |         self.valuestackdepth = unsafe { (&*code).varnames.len() + ncells(unsafe { &*code }) };
[INFO] [stdout]     |                                ------                                    ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                because it's nested under this `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: useless assignment of field of type `*mut pyframe::PyFrame` to itself
[INFO] [stdout]    --> src/executioncontext.rs:379:25
[INFO] [stdout]     |
[INFO] [stdout] 379 |                         self.topframeref = self.topframeref;
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `fromcache` is never read
[INFO] [stdout]    --> src/baseobjspace.rs:107:5
[INFO] [stdout]     |
[INFO] [stdout] 106 | pub struct ObjSpace {
[INFO] [stdout]     |            -------- field in this struct
[INFO] [stdout] 107 |     fromcache: Option<PyObjectRef>,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `ObjSpace` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_staticmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:790:4
[INFO] [stdout]     |
[INFO] [stdout] 790 | fn builtin_staticmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_classmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:801:4
[INFO] [stdout]     |
[INFO] [stdout] 801 | fn builtin_classmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_object` is never used
[INFO] [stdout]     --> src/builtins.rs:1174:4
[INFO] [stdout]      |
[INFO] [stdout] 1174 | fn builtin_object(_args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]      |    ^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `is_builtin_code` is never used
[INFO] [stdout]    --> src/function.rs:476:4
[INFO] [stdout]     |
[INFO] [stdout] 476 | fn is_builtin_code(obj: PyObjectRef) -> bool {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `function_call_obj_args` is never used
[INFO] [stdout]    --> src/function.rs:710:15
[INFO] [stdout]     |
[INFO] [stdout] 710 | pub(crate) fn function_call_obj_args(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `init_collections_abc` is never used
[INFO] [stdout]    --> src/importing.rs:123:4
[INFO] [stdout]     |
[INFO] [stdout] 123 | fn init_collections_abc(ns: &mut PyNamespace) {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `is_in_line_tracing`, `instr_lb`, `instr_ub`, and `instr_prev_plus_one` are never read
[INFO] [stdout]    --> src/pyframe.rs:102:5
[INFO] [stdout]     |
[INFO] [stdout]  97 | pub struct FrameDebugData {
[INFO] [stdout]     |            -------------- fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 102 |     is_in_line_tracing: bool,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 103 |     instr_lb: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 104 |     instr_ub: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 105 |     instr_prev_plus_one: usize,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `FrameDebugData` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fget___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:379:15
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fget_module`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:395:15
[INFO] [stdout]     |
[INFO] [stdout] 395 | pub unsafe fn descr_function__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fset___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:418:15
[INFO] [stdout]     |
[INFO] [stdout] 418 | pub unsafe fn fset___module__(_obj: PyObjectRef, _value: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fset_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fdel___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:422:15
[INFO] [stdout]     |
[INFO] [stdout] 422 | pub unsafe fn fdel___module__(_obj: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fdel_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_builtinfunction__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:431:15
[INFO] [stdout]     |
[INFO] [stdout] 431 | pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_builtinfunction_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_classmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:484:15
[INFO] [stdout]     |
[INFO] [stdout] 484 | pub unsafe fn descr_classmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_classmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_staticmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:517:15
[INFO] [stdout]     |
[INFO] [stdout] 517 | pub unsafe fn descr_staticmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_staticmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:544:15
[INFO] [stdout]     |
[INFO] [stdout] 544 | pub unsafe fn descr_method__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:613:15
[INFO] [stdout]     |
[INFO] [stdout] 613 | pub unsafe fn descr_method__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:663:8
[INFO] [stdout]     |
[INFO] [stdout] 663 | pub fn descr_function__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__setstate__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:672:8
[INFO] [stdout]     |
[INFO] [stdout] 672 | pub fn descr_function__setstate__(_obj: PyObjectRef, _state: PyObjectRef) {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__reduce__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:764:12
[INFO] [stdout]     |
[INFO] [stdout] 764 |     pub fn descr__reduce__(&self) -> PyObjectRef {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__setstate__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:774:12
[INFO] [stdout]     |
[INFO] [stdout] 774 |     pub fn descr__setstate__(&mut self, _state: PyObjectRef) {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning: type `W_Root` should have an upper camel case name
[INFO] [stdout]   --> src/baseobjspace.rs:26:10
[INFO] [stdout]    |
[INFO] [stdout] 26 | pub type W_Root = PyObjectRef;
[INFO] [stdout]    |          ^^^^^^ help: convert the identifier to upper camel case: `WRoot`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(non_camel_case_types)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_Check` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:80:12
[INFO] [stdout]    |
[INFO] [stdout] 80 | pub struct UnwrapSpec_Check {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecCheck`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitRun` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:91:12
[INFO] [stdout]    |
[INFO] [stdout] 91 | pub struct UnwrapSpec_EmitRun;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitRun`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_EmitShortcut` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:94:12
[INFO] [stdout]    |
[INFO] [stdout] 94 | pub struct UnwrapSpec_EmitShortcut;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitShortcut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `UnwrapSpec_FastFunc_Unwrap` should have an upper camel case name
[INFO] [stdout]   --> src/gateway.rs:97:12
[INFO] [stdout]    |
[INFO] [stdout] 97 | pub struct UnwrapSpec_FastFunc_Unwrap;
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecFastFuncUnwrap`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused imports: `is_int` and `w_dict_setitem`
[INFO] [stdout]  --> src/runtime_ops.rs:6:55
[INFO] [stdout]   |
[INFO] [stdout] 6 |     PY_NULL, PyObjectRef, W_SeqIterator, is_instance, is_int, is_list, is_range_iter, is_seq_iter,
[INFO] [stdout]   |                                                       ^^^^^^
[INFO] [stdout] 7 |     is_str, is_tuple, w_dict_new, w_dict_setitem, w_dict_store, w_int_get_value, w_int_new,
[INFO] [stdout]   |                                   ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `PyErrorKind`
[INFO] [stdout]   --> src/call.rs:10:14
[INFO] [stdout]    |
[INFO] [stdout] 10 |     PyError, PyErrorKind, PyNamespace, PyResult, builtin_code_get, dispatch_callable,
[INFO] [stdout]    |              ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `function_new`
[INFO] [stdout]     --> src/eval.rs:1731:37
[INFO] [stdout]      |
[INFO] [stdout] 1731 |     use crate::{PyExecutionContext, function_new};
[INFO] [stdout]      |                                     ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `StrDrive`
[INFO] [stdout]  --> src/module/_sre/moduledef.rs:7:42
[INFO] [stdout]   |
[INFO] [stdout] 7 | use sre_engine::engine::{Request, State, StrDrive};
[INFO] [stdout]   |                                          ^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `is_w` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `is_w` in the value namespace is also re-exported here
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(ambiguous_glob_reexports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: ambiguous glob re-exports
[INFO] [stdout]   --> src/lib.rs:39:9
[INFO] [stdout]    |
[INFO] [stdout] 39 | pub use baseobjspace::*;
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ the name `call_obj_args` in the value namespace is first re-exported here
[INFO] [stdout] ...
[INFO] [stdout] 45 | pub use function::*;
[INFO] [stdout]    |         ----------- but the name `call_obj_args` in the value namespace is also re-exported here
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable statement
[INFO] [stdout]     --> src/eval.rs:1224:9
[INFO] [stdout]      |
[INFO] [stdout] 1219 |         return Ok(());
[INFO] [stdout]      |         ------------- any code following this expression is unreachable
[INFO] [stdout] ...
[INFO] [stdout] 1224 |         let code = self.code;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^ unreachable statement
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]     --> src/baseobjspace.rs:3192:5
[INFO] [stdout]      |
[INFO] [stdout] 3192 |     unsafe {
[INFO] [stdout]      |     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_type` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:685:29
[INFO] [stdout]     |
[INFO] [stdout] 685 |     if w_type.is_null() || !is_type(w_type) {
[INFO] [stdout]     |                             ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/builtins.rs:684:1
[INFO] [stdout]     |
[INFO] [stdout] 684 | unsafe fn issubtype_w(w_type: PyObjectRef, cls: PyObjectRef) -> bool {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_type_get_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:689:19
[INFO] [stdout]     |
[INFO] [stdout] 689 |     let mro_ptr = w_type_get_mro(w_type);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:691:16
[INFO] [stdout]     |
[INFO] [stdout] 691 |         return (*mro_ptr).iter().any(|&t| std::ptr::eq(t, cls));
[INFO] [stdout]     |                ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `baseobjspace::compute_default_mro` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/builtins.rs:694:5
[INFO] [stdout]     |
[INFO] [stdout] 694 |     crate::baseobjspace::compute_default_mro(w_type)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:162:14
[INFO] [stdout]     |
[INFO] [stdout] 162 |     let tp = (*obj).ob_type;
[INFO] [stdout]     |              ^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/display.rs:157:1
[INFO] [stdout]     |
[INFO] [stdout] 157 | pub unsafe fn py_str(obj: PyObjectRef) -> String {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_str_get_value` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:165:16
[INFO] [stdout]     |
[INFO] [stdout] 165 |         return pyre_object::w_str_get_value(obj).to_string();
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `display::py_repr` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/display.rs:175:5
[INFO] [stdout]     |
[INFO] [stdout] 175 |     py_repr(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_kind` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:169:20
[INFO] [stdout]     |
[INFO] [stdout] 169 |         let kind = pyre_object::excobject::w_exception_get_kind(obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/error.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub unsafe fn from_exc_object(obj: PyObjectRef) -> Self {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_message` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/error.rs:170:23
[INFO] [stdout]     |
[INFO] [stdout] 170 |         let message = pyre_object::excobject::w_exception_get_message(obj).to_string();
[INFO] [stdout]     |                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:295:21
[INFO] [stdout]     |
[INFO] [stdout] 289 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 295 |                 if !unsafe { (&*next).hide() } {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/executioncontext.rs:378:21
[INFO] [stdout]     |
[INFO] [stdout] 378 |                     unsafe {
[INFO] [stdout]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:111:1
[INFO] [stdout]     |
[INFO] [stdout] 111 | pub unsafe fn getcode(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:141:28
[INFO] [stdout]     |
[INFO] [stdout] 141 |     pyre_object::w_str_new(function_get_name(obj))
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:140:1
[INFO] [stdout]     |
[INFO] [stdout] 140 | pub unsafe fn fget_func_name(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_getdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:211:5
[INFO] [stdout]     |
[INFO] [stdout] 211 |     function_getdict(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:210:1
[INFO] [stdout]     |
[INFO] [stdout] 210 | pub unsafe fn getdict(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_setdict` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:217:5
[INFO] [stdout]     |
[INFO] [stdout] 217 |     function_setdict(obj, value)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:216:1
[INFO] [stdout]     |
[INFO] [stdout] 216 | pub unsafe fn setdict(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:241:17
[INFO] [stdout]     |
[INFO] [stdout] 241 |     let value = function_get_defaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:240:1
[INFO] [stdout]     |
[INFO] [stdout] 240 | pub unsafe fn fget_func_defaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:253:9
[INFO] [stdout]     |
[INFO] [stdout] 253 |         function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:251:1
[INFO] [stdout]     |
[INFO] [stdout] 251 | pub unsafe fn fset_func_defaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:255:9
[INFO] [stdout]     |
[INFO] [stdout] 255 |         function_set_defaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:262:5
[INFO] [stdout]     |
[INFO] [stdout] 262 |     function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:261:1
[INFO] [stdout]     |
[INFO] [stdout] 261 | pub unsafe fn fdel_func_defaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:268:17
[INFO] [stdout]     |
[INFO] [stdout] 268 |     let value = function_get_kwdefaults(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:267:1
[INFO] [stdout]     |
[INFO] [stdout] 267 | pub unsafe fn fget_func_kwdefaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:280:9
[INFO] [stdout]     |
[INFO] [stdout] 280 |         function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:278:1
[INFO] [stdout]     |
[INFO] [stdout] 278 | pub unsafe fn fset_func_kwdefaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:282:9
[INFO] [stdout]     |
[INFO] [stdout] 282 |         function_set_kwdefaults(obj, value);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:289:5
[INFO] [stdout]     |
[INFO] [stdout] 289 |     function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:288:1
[INFO] [stdout]     |
[INFO] [stdout] 288 | pub unsafe fn fdel_func_kwdefaults(obj: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:295:5
[INFO] [stdout]     |
[INFO] [stdout] 295 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:294:1
[INFO] [stdout]     |
[INFO] [stdout] 294 | pub unsafe fn function_get_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:301:5
[INFO] [stdout]     |
[INFO] [stdout] 301 |     (*(obj as *mut Function)).code = code;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:300:1
[INFO] [stdout]     |
[INFO] [stdout] 300 | pub unsafe fn function_set_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:307:5
[INFO] [stdout]     |
[INFO] [stdout] 307 |     function_get_name(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:306:1
[INFO] [stdout]     |
[INFO] [stdout] 306 | pub unsafe fn function_get_func_name(obj: PyObjectRef) -> &'static str {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_str` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:313:9
[INFO] [stdout]     |
[INFO] [stdout] 313 |     if !pyre_object::is_str(name) {
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:312:1
[INFO] [stdout]     |
[INFO] [stdout] 312 | pub unsafe fn function_set_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:318:15
[INFO] [stdout]     |
[INFO] [stdout] 318 |     let old = (*(obj as *mut Function)).name;
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::boxed::Box::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:320:14
[INFO] [stdout]     |
[INFO] [stdout] 320 |         drop(Box::from_raw(old as *mut String));
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:322:5
[INFO] [stdout]     |
[INFO] [stdout] 322 |     (*(obj as *mut Function)).name = name;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:328:5
[INFO] [stdout]     |
[INFO] [stdout] 328 |     function_set_func_name(obj, name)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:327:1
[INFO] [stdout]     |
[INFO] [stdout] 327 | pub unsafe fn fset_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:338:5
[INFO] [stdout]     |
[INFO] [stdout] 338 |     function_get_globals(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:337:1
[INFO] [stdout]     |
[INFO] [stdout] 337 | pub unsafe fn function_get_w_globals(obj: PyObjectRef) -> *mut PyNamespace {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:344:5
[INFO] [stdout]     |
[INFO] [stdout] 344 |     (*(obj as *mut Function)).w_func_globals = globals;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:343:1
[INFO] [stdout]     |
[INFO] [stdout] 343 | pub unsafe fn function_set_w_globals(obj: PyObjectRef, globals: *mut PyNamespace) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::_check_code_mutable` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:350:5
[INFO] [stdout]     |
[INFO] [stdout] 350 |     _check_code_mutable(obj, "func_code");
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:349:1
[INFO] [stdout]     |
[INFO] [stdout] 349 | pub unsafe fn fset_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_func_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:351:5
[INFO] [stdout]     |
[INFO] [stdout] 351 |     function_set_func_code(obj, code);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:357:5
[INFO] [stdout]     |
[INFO] [stdout] 357 |     function_get_closure(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:356:1
[INFO] [stdout]     |
[INFO] [stdout] 356 | pub unsafe fn function_get_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_func_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:363:17
[INFO] [stdout]     |
[INFO] [stdout] 363 |     let value = function_get_func_closure(obj);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:362:1
[INFO] [stdout]     |
[INFO] [stdout] 362 | pub unsafe fn fget_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_set_closure` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:374:5
[INFO] [stdout]     |
[INFO] [stdout] 374 |     function_set_closure(obj, closure);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:373:1
[INFO] [stdout]     |
[INFO] [stdout] 373 | pub unsafe fn fset_func_closure(obj: PyObjectRef, closure: PyObjectRef) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:380:19
[INFO] [stdout]     |
[INFO] [stdout] 380 |     let globals = function_get_globals(obj);
[INFO] [stdout]     |                   ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:379:1
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::is_none` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:403:41
[INFO] [stdout]     |
[INFO] [stdout] 403 |     let name = if !w_name.is_null() && !pyre_object::is_none(w_name) {
[INFO] [stdout]     |                                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:395:1
[INFO] [stdout]     |
[INFO] [stdout] 395 | / pub unsafe fn descr_function__new__(
[INFO] [stdout] 396 | |     code: *const (),
[INFO] [stdout] 397 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 398 | |     w_name: PyObjectRef,
[INFO] [stdout] 399 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 400 | |     w_closure: PyObjectRef,
[INFO] [stdout] 401 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::descr_function__new__` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:438:5
[INFO] [stdout]     |
[INFO] [stdout] 438 |     descr_function__new__(code, w_globals, w_name, _argdefs, w_closure)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:431:1
[INFO] [stdout]     |
[INFO] [stdout] 431 | / pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout] 432 | |     code: *const (),
[INFO] [stdout] 433 | |     w_globals: *mut PyNamespace,
[INFO] [stdout] 434 | |     w_name: PyObjectRef,
[INFO] [stdout] 435 | |     _argdefs: PyObjectRef,
[INFO] [stdout] 436 | |     w_closure: PyObjectRef,
[INFO] [stdout] 437 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_classmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:506:20
[INFO] [stdout]     |
[INFO] [stdout] 506 |         let func = pyre_object::w_classmethod_get_func(w_obj);
[INFO] [stdout]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:497:1
[INFO] [stdout]     |
[INFO] [stdout] 497 | / pub unsafe fn descr_classmethod_get(
[INFO] [stdout] 498 | |     w_obj: PyObjectRef,
[INFO] [stdout] 499 | |     obj: PyObjectRef,
[INFO] [stdout] 500 | |     w_cls: PyObjectRef,
[INFO] [stdout] 501 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `pyre_object::w_staticmethod_get_func` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:539:9
[INFO] [stdout]     |
[INFO] [stdout] 539 |         pyre_object::w_staticmethod_get_func(obj)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:530:1
[INFO] [stdout]     |
[INFO] [stdout] 530 | / pub unsafe fn descr_staticmethod_get(
[INFO] [stdout] 531 | |     obj: PyObjectRef,
[INFO] [stdout] 532 | |     _obj: PyObjectRef,
[INFO] [stdout] 533 | |     _cls: PyObjectRef,
[INFO] [stdout] 534 | | ) -> PyObjectRef {
[INFO] [stdout]     | |________________^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:651:16
[INFO] [stdout]     |
[INFO] [stdout] 651 |     let name = function_get_name(obj);
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:650:1
[INFO] [stdout]     |
[INFO] [stdout] 650 | pub unsafe fn descr_function_repr(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/function.rs:658:5
[INFO] [stdout]     |
[INFO] [stdout] 658 |     function_get_code(obj)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/function.rs:657:1
[INFO] [stdout]     |
[INFO] [stdout] 657 | pub unsafe fn fget_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1522:9
[INFO] [stdout]      |
[INFO] [stdout] 1497 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ------------------------------ matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1522 |         Instruction::YieldValue { .. } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unreachable_patterns)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unreachable pattern
[INFO] [stdout]     --> src/pyopcode.rs:1712:9
[INFO] [stdout]      |
[INFO] [stdout] 1340 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ----------------------- matches all the relevant values
[INFO] [stdout] ...
[INFO] [stdout] 1712 |         Instruction::Copy { i } => {
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:358:30
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] 357 |                 (&*code).varnames.len()
[INFO] [stdout] 358 |                     + ncells(unsafe { &*code })
[INFO] [stdout]     |                              ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:359:23
[INFO] [stdout]     |
[INFO] [stdout] 356 |             unsafe {
[INFO] [stdout]     |             ------ because it's nested under this `unsafe` block
[INFO] [stdout] ...
[INFO] [stdout] 359 |                     + unsafe { (&*code).max_stackdepth as usize }
[INFO] [stdout]     |                       ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/pyframe.rs:363:74
[INFO] [stdout]     |
[INFO] [stdout] 363 |         self.valuestackdepth = unsafe { (&*code).varnames.len() + ncells(unsafe { &*code }) };
[INFO] [stdout]     |                                ------                                    ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                because it's nested under this `unsafe` block
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: useless assignment of field of type `*mut pyframe::PyFrame` to itself
[INFO] [stdout]    --> src/executioncontext.rs:379:25
[INFO] [stdout]     |
[INFO] [stdout] 379 |                         self.topframeref = self.topframeref;
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `fromcache` is never read
[INFO] [stdout]    --> src/baseobjspace.rs:107:5
[INFO] [stdout]     |
[INFO] [stdout] 106 | pub struct ObjSpace {
[INFO] [stdout]     |            -------- field in this struct
[INFO] [stdout] 107 |     fromcache: Option<PyObjectRef>,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `ObjSpace` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_staticmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:790:4
[INFO] [stdout]     |
[INFO] [stdout] 790 | fn builtin_staticmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_classmethod` is never used
[INFO] [stdout]    --> src/builtins.rs:801:4
[INFO] [stdout]     |
[INFO] [stdout] 801 | fn builtin_classmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `builtin_object` is never used
[INFO] [stdout]     --> src/builtins.rs:1174:4
[INFO] [stdout]      |
[INFO] [stdout] 1174 | fn builtin_object(_args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stdout]      |    ^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `is_builtin_code` is never used
[INFO] [stdout]    --> src/function.rs:476:4
[INFO] [stdout]     |
[INFO] [stdout] 476 | fn is_builtin_code(obj: PyObjectRef) -> bool {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `function_call_obj_args` is never used
[INFO] [stdout]    --> src/function.rs:710:15
[INFO] [stdout]     |
[INFO] [stdout] 710 | pub(crate) fn function_call_obj_args(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `init_collections_abc` is never used
[INFO] [stdout]    --> src/importing.rs:123:4
[INFO] [stdout]     |
[INFO] [stdout] 123 | fn init_collections_abc(ns: &mut PyNamespace) {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `is_in_line_tracing`, `instr_lb`, `instr_ub`, and `instr_prev_plus_one` are never read
[INFO] [stdout]    --> src/pyframe.rs:102:5
[INFO] [stdout]     |
[INFO] [stdout]  97 | pub struct FrameDebugData {
[INFO] [stdout]     |            -------------- fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 102 |     is_in_line_tracing: bool,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 103 |     instr_lb: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 104 |     instr_ub: usize,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 105 |     instr_prev_plus_one: usize,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `FrameDebugData` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fget___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:379:15
[INFO] [stdout]     |
[INFO] [stdout] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fget_module`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(non_snake_case)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:395:15
[INFO] [stdout]     |
[INFO] [stdout] 395 | pub unsafe fn descr_function__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fset___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:418:15
[INFO] [stdout]     |
[INFO] [stdout] 418 | pub unsafe fn fset___module__(_obj: PyObjectRef, _value: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fset_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `fdel___module__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:422:15
[INFO] [stdout]     |
[INFO] [stdout] 422 | pub unsafe fn fdel___module__(_obj: PyObjectRef) {}
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fdel_module`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_builtinfunction__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:431:15
[INFO] [stdout]     |
[INFO] [stdout] 431 | pub unsafe fn descr_builtinfunction__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_builtinfunction_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_classmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:484:15
[INFO] [stdout]     |
[INFO] [stdout] 484 | pub unsafe fn descr_classmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_classmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_staticmethod__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:517:15
[INFO] [stdout]     |
[INFO] [stdout] 517 | pub unsafe fn descr_staticmethod__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_staticmethod_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__new__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:544:15
[INFO] [stdout]     |
[INFO] [stdout] 544 | pub unsafe fn descr_method__new__(
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_new`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_method__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:613:15
[INFO] [stdout]     |
[INFO] [stdout] 613 | pub unsafe fn descr_method__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__reduce__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:663:8
[INFO] [stdout]     |
[INFO] [stdout] 663 | pub fn descr_function__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `descr_function__setstate__` should have a snake case name
[INFO] [stdout]    --> src/function.rs:672:8
[INFO] [stdout]     |
[INFO] [stdout] 672 | pub fn descr_function__setstate__(_obj: PyObjectRef, _state: PyObjectRef) {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__reduce__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:764:12
[INFO] [stdout]     |
[INFO] [stdout] 764 |     pub fn descr__reduce__(&self) -> PyObjectRef {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_reduce`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `descr__setstate__` should have a snake case name
[INFO] [stdout]    --> src/pyframe.rs:774:12
[INFO] [stdout]     |
[INFO] [stdout] 774 |     pub fn descr__setstate__(&mut self, _state: PyObjectRef) {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_setstate`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 5.13s
[INFO] running `Command { std: "docker" "inspect" "b7c831617b8d042e82a5e70dd9d471b773c76fa5b4cfb34fd974486cfcab0ee2", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "b7c831617b8d042e82a5e70dd9d471b773c76fa5b4cfb34fd974486cfcab0ee2", kill_on_drop: false }`
[INFO] [stdout] b7c831617b8d042e82a5e70dd9d471b773c76fa5b4cfb34fd974486cfcab0ee2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=warn" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+beta-2026-04-21" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] 4d761cf49f48c1e9733630b9588c8f173ba24767e10e50de4e52d0431d713d3e
[INFO] running `Command { std: "docker" "start" "-a" "4d761cf49f48c1e9733630b9588c8f173ba24767e10e50de4e52d0431d713d3e", kill_on_drop: false }`
[INFO] [stderr] warning: type `W_Root` should have an upper camel case name
[INFO] [stderr]   --> src/baseobjspace.rs:26:10
[INFO] [stderr]    |
[INFO] [stderr] 26 | pub type W_Root = PyObjectRef;
[INFO] [stderr]    |          ^^^^^^ help: convert the identifier to upper camel case: `WRoot`
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(non_camel_case_types)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: type `UnwrapSpec_Check` should have an upper camel case name
[INFO] [stderr]   --> src/gateway.rs:80:12
[INFO] [stderr]    |
[INFO] [stderr] 80 | pub struct UnwrapSpec_Check {
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecCheck`
[INFO] [stderr] 
[INFO] [stderr] warning: type `UnwrapSpec_EmitRun` should have an upper camel case name
[INFO] [stderr]   --> src/gateway.rs:91:12
[INFO] [stderr]    |
[INFO] [stderr] 91 | pub struct UnwrapSpec_EmitRun;
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitRun`
[INFO] [stderr] 
[INFO] [stderr] warning: type `UnwrapSpec_EmitShortcut` should have an upper camel case name
[INFO] [stderr]   --> src/gateway.rs:94:12
[INFO] [stderr]    |
[INFO] [stderr] 94 | pub struct UnwrapSpec_EmitShortcut;
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecEmitShortcut`
[INFO] [stderr] 
[INFO] [stderr] warning: type `UnwrapSpec_FastFunc_Unwrap` should have an upper camel case name
[INFO] [stderr]   --> src/gateway.rs:97:12
[INFO] [stderr]    |
[INFO] [stderr] 97 | pub struct UnwrapSpec_FastFunc_Unwrap;
[INFO] [stderr]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to upper camel case: `UnwrapSpecFastFuncUnwrap`
[INFO] [stderr] 
[INFO] [stderr] warning: unused imports: `is_int` and `w_dict_setitem`
[INFO] [stderr]  --> src/runtime_ops.rs:6:55
[INFO] [stderr]   |
[INFO] [stderr] 6 |     PY_NULL, PyObjectRef, W_SeqIterator, is_instance, is_int, is_list, is_range_iter, is_seq_iter,
[INFO] [stderr]   |                                                       ^^^^^^
[INFO] [stderr] 7 |     is_str, is_tuple, w_dict_new, w_dict_setitem, w_dict_store, w_int_get_value, w_int_new,
[INFO] [stderr]   |                                   ^^^^^^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `PyErrorKind`
[INFO] [stderr]   --> src/call.rs:10:14
[INFO] [stderr]    |
[INFO] [stderr] 10 |     PyError, PyErrorKind, PyNamespace, PyResult, builtin_code_get, dispatch_callable,
[INFO] [stderr]    |              ^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `StrDrive`
[INFO] [stderr]  --> src/module/_sre/moduledef.rs:7:42
[INFO] [stderr]   |
[INFO] [stderr] 7 | use sre_engine::engine::{Request, State, StrDrive};
[INFO] [stderr]   |                                          ^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: ambiguous glob re-exports
[INFO] [stderr]   --> src/lib.rs:39:9
[INFO] [stderr]    |
[INFO] [stderr] 39 | pub use baseobjspace::*;
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ the name `is_w` in the value namespace is first re-exported here
[INFO] [stderr] ...
[INFO] [stderr] 45 | pub use function::*;
[INFO] [stderr]    |         ----------- but the name `is_w` in the value namespace is also re-exported here
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(ambiguous_glob_reexports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: ambiguous glob re-exports
[INFO] [stderr]   --> src/lib.rs:39:9
[INFO] [stderr]    |
[INFO] [stderr] 39 | pub use baseobjspace::*;
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ the name `call` in the value namespace is first re-exported here
[INFO] [stderr] ...
[INFO] [stderr] 45 | pub use function::*;
[INFO] [stderr]    |         ----------- but the name `call` in the value namespace is also re-exported here
[INFO] [stderr] 
[INFO] [stderr] warning: ambiguous glob re-exports
[INFO] [stderr]   --> src/lib.rs:39:9
[INFO] [stderr]    |
[INFO] [stderr] 39 | pub use baseobjspace::*;
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ the name `call_obj_args` in the value namespace is first re-exported here
[INFO] [stderr] ...
[INFO] [stderr] 45 | pub use function::*;
[INFO] [stderr]    |         ----------- but the name `call_obj_args` in the value namespace is also re-exported here
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable statement
[INFO] [stderr]     --> src/eval.rs:1224:9
[INFO] [stderr]      |
[INFO] [stderr] 1219 |         return Ok(());
[INFO] [stderr]      |         ------------- any code following this expression is unreachable
[INFO] [stderr] ...
[INFO] [stderr] 1224 |         let code = self.code;
[INFO] [stderr]      |         ^^^^^^^^^^^^^^^^^^^^^ unreachable statement
[INFO] [stderr]      |
[INFO] [stderr]      = note: `#[warn(unreachable_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]     --> src/baseobjspace.rs:3192:5
[INFO] [stderr]      |
[INFO] [stderr] 3192 |     unsafe {
[INFO] [stderr]      |     ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr]      |
[INFO] [stderr]      = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::is_type` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/builtins.rs:685:29
[INFO] [stderr]     |
[INFO] [stderr] 685 |     if w_type.is_null() || !is_type(w_type) {
[INFO] [stderr]     |                             ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/builtins.rs:684:1
[INFO] [stderr]     |
[INFO] [stderr] 684 | unsafe fn issubtype_w(w_type: PyObjectRef, cls: PyObjectRef) -> bool {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_type_get_mro` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/builtins.rs:689:19
[INFO] [stderr]     |
[INFO] [stderr] 689 |     let mro_ptr = w_type_get_mro(w_type);
[INFO] [stderr]     |                   ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/builtins.rs:691:16
[INFO] [stderr]     |
[INFO] [stderr] 691 |         return (*mro_ptr).iter().any(|&t| std::ptr::eq(t, cls));
[INFO] [stderr]     |                ^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `baseobjspace::compute_default_mro` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/builtins.rs:694:5
[INFO] [stderr]     |
[INFO] [stderr] 694 |     crate::baseobjspace::compute_default_mro(w_type)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/display.rs:162:14
[INFO] [stderr]     |
[INFO] [stderr] 162 |     let tp = (*obj).ob_type;
[INFO] [stderr]     |              ^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/display.rs:157:1
[INFO] [stderr]     |
[INFO] [stderr] 157 | pub unsafe fn py_str(obj: PyObjectRef) -> String {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_str_get_value` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/display.rs:165:16
[INFO] [stderr]     |
[INFO] [stderr] 165 |         return pyre_object::w_str_get_value(obj).to_string();
[INFO] [stderr]     |                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `display::py_repr` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/display.rs:175:5
[INFO] [stderr]     |
[INFO] [stderr] 175 |     py_repr(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_kind` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/error.rs:169:20
[INFO] [stderr]     |
[INFO] [stderr] 169 |         let kind = pyre_object::excobject::w_exception_get_kind(obj);
[INFO] [stderr]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/error.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 |     pub unsafe fn from_exc_object(obj: PyObjectRef) -> Self {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_exception_get_message` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/error.rs:170:23
[INFO] [stderr]     |
[INFO] [stderr] 170 |         let message = pyre_object::excobject::w_exception_get_message(obj).to_string();
[INFO] [stderr]     |                       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/executioncontext.rs:295:21
[INFO] [stderr]     |
[INFO] [stderr] 289 |             unsafe {
[INFO] [stderr]     |             ------ because it's nested under this `unsafe` block
[INFO] [stderr] ...
[INFO] [stderr] 295 |                 if !unsafe { (&*next).hide() } {
[INFO] [stderr]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/executioncontext.rs:378:21
[INFO] [stderr]     |
[INFO] [stderr] 378 |                     unsafe {
[INFO] [stderr]     |                     ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:112:5
[INFO] [stderr]     |
[INFO] [stderr] 112 |     function_get_code(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:111:1
[INFO] [stderr]     |
[INFO] [stderr] 111 | pub unsafe fn getcode(obj: PyObjectRef) -> *const () {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:141:28
[INFO] [stderr]     |
[INFO] [stderr] 141 |     pyre_object::w_str_new(function_get_name(obj))
[INFO] [stderr]     |                            ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:140:1
[INFO] [stderr]     |
[INFO] [stderr] 140 | pub unsafe fn fget_func_name(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_getdict` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:211:5
[INFO] [stderr]     |
[INFO] [stderr] 211 |     function_getdict(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:210:1
[INFO] [stderr]     |
[INFO] [stderr] 210 | pub unsafe fn getdict(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_setdict` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:217:5
[INFO] [stderr]     |
[INFO] [stderr] 217 |     function_setdict(obj, value)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:216:1
[INFO] [stderr]     |
[INFO] [stderr] 216 | pub unsafe fn setdict(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_defaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:241:17
[INFO] [stderr]     |
[INFO] [stderr] 241 |     let value = function_get_defaults(obj);
[INFO] [stderr]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:240:1
[INFO] [stderr]     |
[INFO] [stderr] 240 | pub unsafe fn fget_func_defaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:253:9
[INFO] [stderr]     |
[INFO] [stderr] 253 |         function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:251:1
[INFO] [stderr]     |
[INFO] [stderr] 251 | pub unsafe fn fset_func_defaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:255:9
[INFO] [stderr]     |
[INFO] [stderr] 255 |         function_set_defaults(obj, value);
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_defaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:262:5
[INFO] [stderr]     |
[INFO] [stderr] 262 |     function_set_defaults(obj, pyre_object::PY_NULL);
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:261:1
[INFO] [stderr]     |
[INFO] [stderr] 261 | pub unsafe fn fdel_func_defaults(obj: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_kwdefaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:268:17
[INFO] [stderr]     |
[INFO] [stderr] 268 |     let value = function_get_kwdefaults(obj);
[INFO] [stderr]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:267:1
[INFO] [stderr]     |
[INFO] [stderr] 267 | pub unsafe fn fget_func_kwdefaults(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:280:9
[INFO] [stderr]     |
[INFO] [stderr] 280 |         function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:278:1
[INFO] [stderr]     |
[INFO] [stderr] 278 | pub unsafe fn fset_func_kwdefaults(obj: PyObjectRef, value: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:282:9
[INFO] [stderr]     |
[INFO] [stderr] 282 |         function_set_kwdefaults(obj, value);
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_kwdefaults` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:289:5
[INFO] [stderr]     |
[INFO] [stderr] 289 |     function_set_kwdefaults(obj, pyre_object::PY_NULL);
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:288:1
[INFO] [stderr]     |
[INFO] [stderr] 288 | pub unsafe fn fdel_func_kwdefaults(obj: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:295:5
[INFO] [stderr]     |
[INFO] [stderr] 295 |     function_get_code(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:294:1
[INFO] [stderr]     |
[INFO] [stderr] 294 | pub unsafe fn function_get_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:301:5
[INFO] [stderr]     |
[INFO] [stderr] 301 |     (*(obj as *mut Function)).code = code;
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:300:1
[INFO] [stderr]     |
[INFO] [stderr] 300 | pub unsafe fn function_set_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:307:5
[INFO] [stderr]     |
[INFO] [stderr] 307 |     function_get_name(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:306:1
[INFO] [stderr]     |
[INFO] [stderr] 306 | pub unsafe fn function_get_func_name(obj: PyObjectRef) -> &'static str {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::is_str` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:313:9
[INFO] [stderr]     |
[INFO] [stderr] 313 |     if !pyre_object::is_str(name) {
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:312:1
[INFO] [stderr]     |
[INFO] [stderr] 312 | pub unsafe fn function_set_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:318:15
[INFO] [stderr]     |
[INFO] [stderr] 318 |     let old = (*(obj as *mut Function)).name;
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::boxed::Box::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:320:14
[INFO] [stderr]     |
[INFO] [stderr] 320 |         drop(Box::from_raw(old as *mut String));
[INFO] [stderr]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:322:5
[INFO] [stderr]     |
[INFO] [stderr] 322 |     (*(obj as *mut Function)).name = name;
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_func_name` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:328:5
[INFO] [stderr]     |
[INFO] [stderr] 328 |     function_set_func_name(obj, name)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:327:1
[INFO] [stderr]     |
[INFO] [stderr] 327 | pub unsafe fn fset_func_name(obj: PyObjectRef, name: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:338:5
[INFO] [stderr]     |
[INFO] [stderr] 338 |     function_get_globals(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:337:1
[INFO] [stderr]     |
[INFO] [stderr] 337 | pub unsafe fn function_get_w_globals(obj: PyObjectRef) -> *mut PyNamespace {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:344:5
[INFO] [stderr]     |
[INFO] [stderr] 344 |     (*(obj as *mut Function)).w_func_globals = globals;
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:343:1
[INFO] [stderr]     |
[INFO] [stderr] 343 | pub unsafe fn function_set_w_globals(obj: PyObjectRef, globals: *mut PyNamespace) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::_check_code_mutable` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:350:5
[INFO] [stderr]     |
[INFO] [stderr] 350 |     _check_code_mutable(obj, "func_code");
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:349:1
[INFO] [stderr]     |
[INFO] [stderr] 349 | pub unsafe fn fset_func_code(obj: PyObjectRef, code: *const ()) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_func_code` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:351:5
[INFO] [stderr]     |
[INFO] [stderr] 351 |     function_set_func_code(obj, code);
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_closure` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:357:5
[INFO] [stderr]     |
[INFO] [stderr] 357 |     function_get_closure(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:356:1
[INFO] [stderr]     |
[INFO] [stderr] 356 | pub unsafe fn function_get_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_func_closure` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:363:17
[INFO] [stderr]     |
[INFO] [stderr] 363 |     let value = function_get_func_closure(obj);
[INFO] [stderr]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:362:1
[INFO] [stderr]     |
[INFO] [stderr] 362 | pub unsafe fn fget_func_closure(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_set_closure` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:374:5
[INFO] [stderr]     |
[INFO] [stderr] 374 |     function_set_closure(obj, closure);
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:373:1
[INFO] [stderr]     |
[INFO] [stderr] 373 | pub unsafe fn fset_func_closure(obj: PyObjectRef, closure: PyObjectRef) {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_globals` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:380:19
[INFO] [stderr]     |
[INFO] [stderr] 380 |     let globals = function_get_globals(obj);
[INFO] [stderr]     |                   ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:379:1
[INFO] [stderr]     |
[INFO] [stderr] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::is_none` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:403:41
[INFO] [stderr]     |
[INFO] [stderr] 403 |     let name = if !w_name.is_null() && !pyre_object::is_none(w_name) {
[INFO] [stderr]     |                                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:395:1
[INFO] [stderr]     |
[INFO] [stderr] 395 | / pub unsafe fn descr_function__new__(
[INFO] [stderr] 396 | |     code: *const (),
[INFO] [stderr] 397 | |     w_globals: *mut PyNamespace,
[INFO] [stderr] 398 | |     w_name: PyObjectRef,
[INFO] [stderr] 399 | |     _argdefs: PyObjectRef,
[INFO] [stderr] 400 | |     w_closure: PyObjectRef,
[INFO] [stderr] 401 | | ) -> PyObjectRef {
[INFO] [stderr]     | |________________^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::descr_function__new__` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:438:5
[INFO] [stderr]     |
[INFO] [stderr] 438 |     descr_function__new__(code, w_globals, w_name, _argdefs, w_closure)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:431:1
[INFO] [stderr]     |
[INFO] [stderr] 431 | / pub unsafe fn descr_builtinfunction__new__(
[INFO] [stderr] 432 | |     code: *const (),
[INFO] [stderr] 433 | |     w_globals: *mut PyNamespace,
[INFO] [stderr] 434 | |     w_name: PyObjectRef,
[INFO] [stderr] 435 | |     _argdefs: PyObjectRef,
[INFO] [stderr] 436 | |     w_closure: PyObjectRef,
[INFO] [stderr] 437 | | ) -> PyObjectRef {
[INFO] [stderr]     | |________________^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_classmethod_get_func` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:506:20
[INFO] [stderr]     |
[INFO] [stderr] 506 |         let func = pyre_object::w_classmethod_get_func(w_obj);
[INFO] [stderr]     |                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:497:1
[INFO] [stderr]     |
[INFO] [stderr] 497 | / pub unsafe fn descr_classmethod_get(
[INFO] [stderr] 498 | |     w_obj: PyObjectRef,
[INFO] [stderr] 499 | |     obj: PyObjectRef,
[INFO] [stderr] 500 | |     w_cls: PyObjectRef,
[INFO] [stderr] 501 | | ) -> PyObjectRef {
[INFO] [stderr]     | |________________^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `pyre_object::w_staticmethod_get_func` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:539:9
[INFO] [stderr]     |
[INFO] [stderr] 539 |         pyre_object::w_staticmethod_get_func(obj)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:530:1
[INFO] [stderr]     |
[INFO] [stderr] 530 | / pub unsafe fn descr_staticmethod_get(
[INFO] [stderr] 531 | |     obj: PyObjectRef,
[INFO] [stderr] 532 | |     _obj: PyObjectRef,
[INFO] [stderr] 533 | |     _cls: PyObjectRef,
[INFO] [stderr] 534 | | ) -> PyObjectRef {
[INFO] [stderr]     | |________________^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_name` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:651:16
[INFO] [stderr]     |
[INFO] [stderr] 651 |     let name = function_get_name(obj);
[INFO] [stderr]     |                ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:650:1
[INFO] [stderr]     |
[INFO] [stderr] 650 | pub unsafe fn descr_function_repr(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `function::function_get_code` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/function.rs:658:5
[INFO] [stderr]     |
[INFO] [stderr] 658 |     function_get_code(obj)
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/function.rs:657:1
[INFO] [stderr]     |
[INFO] [stderr] 657 | pub unsafe fn fget_func_code(obj: PyObjectRef) -> *const () {
[INFO] [stderr]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]     --> src/pyopcode.rs:1522:9
[INFO] [stderr]      |
[INFO] [stderr] 1497 |         Instruction::YieldValue { .. } => {
[INFO] [stderr]      |         ------------------------------ matches all the relevant values
[INFO] [stderr] ...
[INFO] [stderr] 1522 |         Instruction::YieldValue { .. } => {
[INFO] [stderr]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stderr]      |
[INFO] [stderr]      = note: `#[warn(unreachable_patterns)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unreachable pattern
[INFO] [stderr]     --> src/pyopcode.rs:1712:9
[INFO] [stderr]      |
[INFO] [stderr] 1340 |         Instruction::Copy { i } => {
[INFO] [stderr]      |         ----------------------- matches all the relevant values
[INFO] [stderr] ...
[INFO] [stderr] 1712 |         Instruction::Copy { i } => {
[INFO] [stderr]      |         ^^^^^^^^^^^^^^^^^^^^^^^ no value can reach this
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/pyframe.rs:358:30
[INFO] [stderr]     |
[INFO] [stderr] 356 |             unsafe {
[INFO] [stderr]     |             ------ because it's nested under this `unsafe` block
[INFO] [stderr] 357 |                 (&*code).varnames.len()
[INFO] [stderr] 358 |                     + ncells(unsafe { &*code })
[INFO] [stderr]     |                              ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/pyframe.rs:359:23
[INFO] [stderr]     |
[INFO] [stderr] 356 |             unsafe {
[INFO] [stderr]     |             ------ because it's nested under this `unsafe` block
[INFO] [stderr] ...
[INFO] [stderr] 359 |                     + unsafe { (&*code).max_stackdepth as usize }
[INFO] [stderr]     |                       ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr] 
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/pyframe.rs:363:74
[INFO] [stderr]     |
[INFO] [stderr] 363 |         self.valuestackdepth = unsafe { (&*code).varnames.len() + ncells(unsafe { &*code }) };
[INFO] [stderr]     |                                ------                                    ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr]     |                                |
[INFO] [stderr]     |                                because it's nested under this `unsafe` block
[INFO] [stderr] 
[INFO] [stderr] warning: useless assignment of field of type `*mut pyframe::PyFrame` to itself
[INFO] [stderr]    --> src/executioncontext.rs:379:25
[INFO] [stderr]     |
[INFO] [stderr] 379 |                         self.topframeref = self.topframeref;
[INFO] [stderr]     |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: field `fromcache` is never read
[INFO] [stderr]    --> src/baseobjspace.rs:107:5
[INFO] [stderr]     |
[INFO] [stderr] 106 | pub struct ObjSpace {
[INFO] [stderr]     |            -------- field in this struct
[INFO] [stderr] 107 |     fromcache: Option<PyObjectRef>,
[INFO] [stderr]     |     ^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `ObjSpace` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: function `builtin_staticmethod` is never used
[INFO] [stderr]    --> src/builtins.rs:790:4
[INFO] [stderr]     |
[INFO] [stderr] 790 | fn builtin_staticmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `builtin_classmethod` is never used
[INFO] [stderr]    --> src/builtins.rs:801:4
[INFO] [stderr]     |
[INFO] [stderr] 801 | fn builtin_classmethod(args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `builtin_object` is never used
[INFO] [stderr]     --> src/builtins.rs:1174:4
[INFO] [stderr]      |
[INFO] [stderr] 1174 | fn builtin_object(_args: &[PyObjectRef]) -> Result<PyObjectRef, crate::PyError> {
[INFO] [stderr]      |    ^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `is_builtin_code` is never used
[INFO] [stderr]    --> src/function.rs:476:4
[INFO] [stderr]     |
[INFO] [stderr] 476 | fn is_builtin_code(obj: PyObjectRef) -> bool {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `function_call_obj_args` is never used
[INFO] [stderr]    --> src/function.rs:710:15
[INFO] [stderr]     |
[INFO] [stderr] 710 | pub(crate) fn function_call_obj_args(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `init_collections_abc` is never used
[INFO] [stderr]    --> src/importing.rs:123:4
[INFO] [stderr]     |
[INFO] [stderr] 123 | fn init_collections_abc(ns: &mut PyNamespace) {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: fields `is_in_line_tracing`, `instr_lb`, `instr_ub`, and `instr_prev_plus_one` are never read
[INFO] [stderr]    --> src/pyframe.rs:102:5
[INFO] [stderr]     |
[INFO] [stderr]  97 | pub struct FrameDebugData {
[INFO] [stderr]     |            -------------- fields in this struct
[INFO] [stderr] ...
[INFO] [stderr] 102 |     is_in_line_tracing: bool,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 103 |     instr_lb: usize,
[INFO] [stderr]     |     ^^^^^^^^
[INFO] [stderr] 104 |     instr_ub: usize,
[INFO] [stderr]     |     ^^^^^^^^
[INFO] [stderr] 105 |     instr_prev_plus_one: usize,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `FrameDebugData` has a derived impl for the trait `Clone`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: function `fget___module__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:379:15
[INFO] [stderr]     |
[INFO] [stderr] 379 | pub unsafe fn fget___module__(obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fget_module`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(non_snake_case)]` (part of `#[warn(nonstandard_style)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_function__new__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:395:15
[INFO] [stderr]     |
[INFO] [stderr] 395 | pub unsafe fn descr_function__new__(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_new`
[INFO] [stderr] 
[INFO] [stderr] warning: function `fset___module__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:418:15
[INFO] [stderr]     |
[INFO] [stderr] 418 | pub unsafe fn fset___module__(_obj: PyObjectRef, _value: PyObjectRef) {}
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fset_module`
[INFO] [stderr] 
[INFO] [stderr] warning: function `fdel___module__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:422:15
[INFO] [stderr]     |
[INFO] [stderr] 422 | pub unsafe fn fdel___module__(_obj: PyObjectRef) {}
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `fdel_module`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_builtinfunction__new__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:431:15
[INFO] [stderr]     |
[INFO] [stderr] 431 | pub unsafe fn descr_builtinfunction__new__(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_builtinfunction_new`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_classmethod__new__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:484:15
[INFO] [stderr]     |
[INFO] [stderr] 484 | pub unsafe fn descr_classmethod__new__(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_classmethod_new`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_staticmethod__new__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:517:15
[INFO] [stderr]     |
[INFO] [stderr] 517 | pub unsafe fn descr_staticmethod__new__(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_staticmethod_new`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_method__new__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:544:15
[INFO] [stderr]     |
[INFO] [stderr] 544 | pub unsafe fn descr_method__new__(
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_new`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_method__reduce__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:613:15
[INFO] [stderr]     |
[INFO] [stderr] 613 | pub unsafe fn descr_method__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     |               ^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_method_reduce`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_function__reduce__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:663:8
[INFO] [stderr]     |
[INFO] [stderr] 663 | pub fn descr_function__reduce__(_obj: PyObjectRef) -> PyObjectRef {
[INFO] [stderr]     |        ^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_reduce`
[INFO] [stderr] 
[INFO] [stderr] warning: function `descr_function__setstate__` should have a snake case name
[INFO] [stderr]    --> src/function.rs:672:8
[INFO] [stderr]     |
[INFO] [stderr] 672 | pub fn descr_function__setstate__(_obj: PyObjectRef, _state: PyObjectRef) {
[INFO] [stderr]     |        ^^^^^^^^^^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_function_setstate`
[INFO] [stderr] 
[INFO] [stderr] warning: method `descr__reduce__` should have a snake case name
[INFO] [stderr]    --> src/pyframe.rs:764:12
[INFO] [stderr]     |
[INFO] [stderr] 764 |     pub fn descr__reduce__(&self) -> PyObjectRef {
[INFO] [stderr]     |            ^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_reduce`
[INFO] [stderr] 
[INFO] [stderr] warning: method `descr__setstate__` should have a snake case name
[INFO] [stderr]    --> src/pyframe.rs:774:12
[INFO] [stderr]     |
[INFO] [stderr] 774 |     pub fn descr__setstate__(&mut self, _state: PyObjectRef) {
[INFO] [stderr]     |            ^^^^^^^^^^^^^^^^^ help: convert the identifier to snake case: `descr_setstate`
[INFO] [stderr] 
[INFO] [stderr] For more information about this error, try `rustc --explain E0133`.
[INFO] [stderr] warning: unused import: `function_new`
[INFO] [stderr]     --> src/eval.rs:1731:37
[INFO] [stderr]      |
[INFO] [stderr] 1731 |     use crate::{PyExecutionContext, function_new};
[INFO] [stderr]      |                                     ^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: `pyre-interpreter` (lib) generated 85 warnings (run `cargo fix --lib -p pyre-interpreter` to apply 34 suggestions)
[INFO] [stderr] warning: `pyre-interpreter` (lib test) generated 86 warnings (85 duplicates) (run `cargo fix --lib -p pyre-interpreter --tests` to apply 1 suggestion)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.17s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/pyre_interpreter-9553e22ae2437100)
[INFO] [stdout] 
[INFO] [stdout] running 175 tests
[INFO] [stdout] test baseobjspace::tests::test_int_pow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_lshift_overflow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_bitand ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_add ... ok
[INFO] [stdout] test baseobjspace::tests::test_getattr_missing ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_pow_negative_exponent ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_add_overflow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_pow_overflow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_compare ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_bitxor ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_bitor ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_mul_overflow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_lshift ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_sub_overflow ... ok
[INFO] [stdout] test baseobjspace::tests::test_int_rshift ... ok
[INFO] [stdout] test baseobjspace::tests::test_invert_int ... ok
[INFO] [stdout] test baseobjspace::tests::test_long_add ... ok
[INFO] [stdout] test baseobjspace::tests::test_long_bitand ... ok
[INFO] [stdout] test baseobjspace::tests::test_long_compare ... ok
[INFO] [stdout] test baseobjspace::tests::test_long_demote_to_int ... ok
[INFO] [stdout] test baseobjspace::tests::test_long_truthiness ... ok
[INFO] [stdout] test baseobjspace::tests::test_negate_min_int ... ok
[INFO] [stdout] test baseobjspace::tests::test_py_contains_manual_list ... ok
[INFO] [stdout] test baseobjspace::tests::test_negative_shift_count ... ok
[INFO] [stdout] test baseobjspace::tests::test_truthiness ... ok
[INFO] [stdout] test baseobjspace::tests::test_setattr_getattr ... ok
[INFO] [stdout] test baseobjspace::tests::test_zero_division ... ok
[INFO] [stdout] test eval::tests::test_bitwise_ops ... ok
[INFO] [stdout] test eval::tests::test_augmented_assign_list ... ok
[INFO] [stdout] test eval::tests::test_builtin_len ... ok
[INFO] [stdout] test eval::tests::test_bool_result ... ok
[INFO] [stdout] test eval::tests::test_boolean_operators ... ok
[INFO] [stdout] test eval::tests::test_bound_method_materialized_by_attribute_access ... ok
[INFO] [stdout] test eval::tests::test_bound_method_lookup_materializes_method_object ... ok
[INFO] [stdout] test eval::tests::test_builtin_function_stored_on_class_is_not_bound ... ok
[INFO] [stdout] test eval::tests::test_builtin_abs ... ok
[INFO] [stdout] test eval::tests::test_addition ... ok
[INFO] [stdout] test eval::tests::test_attr_overwrite ... ok
[INFO] [stdout] test eval::tests::test_attr_on_different_objects ... ok
[INFO] [stdout] test baseobjspace::tests::test_setattr_overwrite ... ok
[INFO] [stdout] test eval::tests::test_closure_basic ... ignored, closure: RustPython uses LOAD_FAST for freevars, needs COPY_FREE_VARS to copy cells
[INFO] [stdout] test eval::tests::test_builtin_min_max ... ok
[INFO] [stdout] test eval::tests::test_comparison_false ... ok
[INFO] [stdout] test baseobjspace::tests::test_invert_long ... ok
[INFO] [stdout] test eval::tests::test_contains_op_not_in ... ok
[INFO] [stdout] test eval::tests::test_complex_expr ... ok
[INFO] [stdout] test eval::tests::test_builtin_type_method_materialized_by_attribute_access ... ok
[INFO] [stdout] test eval::tests::test_contains_op_in ... ok
[INFO] [stdout] test eval::tests::test_chained_comparison ... ok
[INFO] [stdout] test eval::tests::test_comparison ... ok
[INFO] [stdout] test eval::tests::test_builtin_range_print ... ok
[INFO] [stdout] test eval::tests::test_float_literal ... ok
[INFO] [stdout] test eval::tests::test_float_int_mixed ... ok
[INFO] [stdout] test eval::tests::test_float_addition ... ok
[INFO] [stdout] test eval::tests::test_dict_literal_and_subscr ... ok
[INFO] [stdout] test eval::tests::test_delete_subscr ... ok
[INFO] [stdout] test eval::tests::test_float_comparison ... ok
[INFO] [stdout] test eval::tests::test_for_loop_over_list ... ok
[INFO] [stdout] test eval::tests::test_float_truediv ... ok
[INFO] [stdout] test eval::tests::test_enumerate_style ... ok
[INFO] [stdout] test eval::tests::test_floor_division ... ok
[INFO] [stdout] test eval::tests::test_for_range ... ok
[INFO] [stdout] test eval::tests::test_float_negation ... ok
[INFO] [stdout] test eval::tests::test_for_loop_over_string ... ok
[INFO] [stdout] test eval::tests::test_for_range_empty ... ok
[INFO] [stdout] test eval::tests::test_dict_access_ops ... ok
[INFO] [stdout] test eval::tests::test_for_with_continue ... ok
[INFO] [stdout] test eval::tests::test_fstring_with_expr ... ok
[INFO] [stdout] test eval::tests::test_fstring ... ok
[INFO] [stdout] test eval::tests::test_function_with_locals ... ok
[INFO] [stdout] test eval::tests::test_globals_builtin_uses_current_module_namespace ... ok
[INFO] [stdout] test eval::tests::test_for_range_start_stop ... ok
[INFO] [stdout] test eval::tests::test_function_dunder_globals_and_code_are_materialized ... ok
[INFO] [stdout] test eval::tests::test_for_range_step ... ok
[INFO] [stdout] test eval::tests::test_default_args ... ok
[INFO] [stdout] test eval::tests::test_float_truthiness ... ok
[INFO] [stdout] test eval::tests::test_hot_empty_dict_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_empty_tuple_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_empty_string_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_float_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_eval_loop_redecodes_opargs_after_extended_arg_jumps ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_len_string_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_len_dict_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_min_small_int_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_isinstance_false_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_dict_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_max_small_int_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_abs_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_list_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_isinstance_true_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_bitwise_or_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_is_not_none ... ok
[INFO] [stdout] test eval::tests::test_hot_builtin_type_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_inplace_add ... ok
[INFO] [stdout] test eval::tests::test_is_not_op ... ok
[INFO] [stdout] test eval::tests::test_is_op ... ok
[INFO] [stdout] test eval::tests::test_list_multiply ... ok
[INFO] [stdout] test eval::tests::test_list_slice_negative ... ok
[INFO] [stdout] test eval::tests::test_list_comprehension ... ok
[INFO] [stdout] test eval::tests::test_list_store_subscr ... ok
[INFO] [stdout] test eval::tests::test_list_subscr ... ok
[INFO] [stdout] test eval::tests::test_list_literal ... ok
[INFO] [stdout] test eval::tests::test_literal ... ok
[INFO] [stdout] test eval::tests::test_metaclass_method_materialized_by_attribute_access ... ok
[INFO] [stdout] test eval::tests::test_modulo ... ok
[INFO] [stdout] test eval::tests::test_multiple_assignment ... ok
[INFO] [stdout] test eval::tests::test_multiple_except ... ok
[INFO] [stdout] test eval::tests::test_multiplication ... ok
[INFO] [stdout] test eval::tests::test_locals_builtin_uses_current_function_locals ... ok
[INFO] [stdout] test eval::tests::test_negative_index ... ok
[INFO] [stdout] test eval::tests::test_locals_builtin_uses_class_namespace ... ok
[INFO] [stdout] test eval::tests::test_nested_for_loops ... ok
[INFO] [stdout] test eval::tests::test_nested_function_call ... ok
[INFO] [stdout] test eval::tests::test_none_is_none ... ok
[INFO] [stdout] test eval::tests::test_not_in ... ok
[INFO] [stdout] test eval::tests::test_none_result ... ok
[INFO] [stdout] test eval::tests::test_power_operator ... ok
[INFO] [stdout] test eval::tests::test_simple_function ... ok
[INFO] [stdout] test eval::tests::test_recursive_fibonacci ... ok
[INFO] [stdout] test eval::tests::test_store_load_attr ... ok
[INFO] [stdout] test eval::tests::test_store_load_multiple_attrs ... ok
[INFO] [stdout] test eval::tests::test_store_load_namespace ... ok
[INFO] [stdout] test eval::tests::test_str_comparison ... ok
[INFO] [stdout] test eval::tests::test_str_concat ... ok
[INFO] [stdout] test eval::tests::test_str_literal ... ok
[INFO] [stdout] test eval::tests::test_hot_list_negative_index_store_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_string_contains ... ok
[INFO] [stdout] test eval::tests::test_string_iteration_chars ... ok
[INFO] [stdout] test eval::tests::test_hot_range_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_string_multiply ... ok
[INFO] [stdout] test eval::tests::test_hot_string_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_str_repeat ... ok
[INFO] [stdout] test eval::tests::test_string_len ... ok
[INFO] [stdout] test eval::tests::test_try_except_no_match_propagates ... ok
[INFO] [stdout] test eval::tests::test_staticmethod_prepare_is_called_with_bound_lookup ... ok
[INFO] [stdout] test eval::tests::test_try_except_specific ... ok
[INFO] [stdout] test eval::tests::test_try_finally ... ok
[INFO] [stdout] test eval::tests::test_tuple_contains ... ok
[INFO] [stdout] test eval::tests::test_tuple_unpack ... ok
[INFO] [stdout] test eval::tests::test_tuple_unpacking_assign ... ok
[INFO] [stdout] test eval::tests::test_hot_positive_mod_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_type_builtin_rejects_invalid_arity ... ok
[INFO] [stdout] test eval::tests::test_vars_builtin_raises_type_error_without_dict ... ok
[INFO] [stdout] test eval::tests::test_recursive_function ... ok
[INFO] [stdout] test eval::tests::test_while_loop_with_break ... ok
[INFO] [stdout] test executioncontext::tests::test_namespace_slots_stay_stable_when_appending_names ... ok
[INFO] [stdout] test function::tests::test_function_create ... ok
[INFO] [stdout] test executioncontext::tests::test_fresh_namespace_starts_with_builtins ... ok
[INFO] [stdout] test function::tests::test_function_field_offsets ... ok
[INFO] [stdout] test importing::tests::test_sys_modules_cache ... ok
[INFO] [stdout] test opcode_ops::tests::test_binary_value_reuses_objspace_dispatch ... ok
[INFO] [stdout] test opcode_ops::tests::test_compare_value_reuses_objspace_dispatch ... ok
[INFO] [stdout] test opcode_ops::tests::test_jit_abi_helpers_share_same_objspace_semantics ... ok
[INFO] [stdout] test opcode_ops::tests::test_jit_getitem_and_setitem_share_objspace_semantics ... ok
[INFO] [stdout] test eval::tests::test_subtraction ... ok
[INFO] [stdout] test eval::tests::test_try_except_basic ... ok
[INFO] [stdout] test runtime_ops::tests::test_dispatch_callable_runs_builtin_branch ... ok
[INFO] [stdout] test runtime_ops::tests::test_jit_range_iter_helper_shares_iterator_semantics ... ok
[INFO] [stdout] test eval::tests::test_while_loop ... ok
[INFO] [stdout] test runtime_ops::tests::test_jit_sequence_getitem_shares_runtime_sequence_semantics ... ok
[INFO] [stdout] test runtime_ops::tests::test_range_iter_helpers_share_iterator_semantics ... ok
[INFO] [stdout] test runtime_ops::tests::test_dispatch_callable_rejects_non_callable ... ok
[INFO] [stdout] test eval::tests::test_hot_positive_floordiv_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_list_index_store_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_module_branch_loop_survives_compiled_trace ... ok
[INFO] [stdout] test pyopcode::tests::decode_instruction_at_matches_forward_decode_across_extended_arg_prefix ... ok
[INFO] [stdout] test eval::tests::test_hot_tuple_negative_index_load_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_list_slice ... FAILED
[INFO] [stdout] test eval::tests::test_to_bool ... ok
[INFO] [stdout] test opcode_ops::tests::test_truth_and_unary_helpers_share_objspace_semantics ... ok
[INFO] [stdout] test eval::tests::test_hot_none_truth_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_unary_invert_loop_survives_compiled_trace ... ok
[INFO] [stdout] test eval::tests::test_hot_user_function_loop_survives_compiled_trace ... ok
[INFO] [stdout] test importing::tests::test_find_module_nonexistent ... ok
[INFO] [stdout] test eval::tests::test_hot_tuple_unpack_loop_survives_compiled_trace ... ok
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- eval::tests::test_list_slice stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'eval::tests::test_list_slice' (127) panicked at src/eval.rs:2893:23:
[INFO] [stdout] list_slice failed: unsupported constant (kind: TypeError)
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x61de8b27fd1a - std[128c3efe2914e152]::backtrace_rs::backtrace::libunwind::trace
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x61de8b27fd1a - std[128c3efe2914e152]::backtrace_rs::backtrace::trace_unsynchronized::<std[128c3efe2914e152]::sys::backtrace::_print_fmt::{closure#1}>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x61de8b27fd1a - std[128c3efe2914e152]::sys::backtrace::_print_fmt
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/backtrace.rs:74:9
[INFO] [stdout]    3:     0x61de8b27fd1a - <<std[128c3efe2914e152]::sys::backtrace::BacktraceLock>::print::DisplayBacktrace as core[6771d259883166e6]::fmt::Display>::fmt
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/backtrace.rs:44:26
[INFO] [stdout]    4:     0x61de8b296b7a - <core[6771d259883166e6]::fmt::rt::Argument>::fmt
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/fmt/rt.rs:152:76
[INFO] [stdout]    5:     0x61de8b296b7a - core[6771d259883166e6]::fmt::write
[INFO] [stdout]    6:     0x61de8b284602 - std[128c3efe2914e152]::io::default_write_fmt::<alloc[fef50e8eecedd288]::vec::Vec<u8>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/io/mod.rs:621:11
[INFO] [stdout]    7:     0x61de8b284602 - <alloc[fef50e8eecedd288]::vec::Vec<u8> as std[128c3efe2914e152]::io::Write>::write_fmt
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/io/mod.rs:1976:13
[INFO] [stdout]    8:     0x61de8b25e64f - <std[128c3efe2914e152]::sys::backtrace::BacktraceLock>::print
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/backtrace.rs:47:9
[INFO] [stdout]    9:     0x61de8b25e64f - std[128c3efe2914e152]::panicking::default_hook::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:292:27
[INFO] [stdout]   10:     0x61de8b277d29 - std[128c3efe2914e152]::panicking::default_hook
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:316:9
[INFO] [stdout]   11:     0x61de8ac6808c - <alloc[fef50e8eecedd288]::boxed::Box<dyn for<'a, 'b> core[6771d259883166e6]::ops::function::Fn<(&'a std[128c3efe2914e152]::panic::PanicHookInfo<'b>,), Output = ()> + core[6771d259883166e6]::marker::Sync + core[6771d259883166e6]::marker::Send> as core[6771d259883166e6]::ops::function::Fn<(&std[128c3efe2914e152]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/alloc/src/boxed.rs:2263:9
[INFO] [stdout]   12:     0x61de8ac6808c - test[b137923399915ecf]::test_main_with_exit_callback::<test[b137923399915ecf]::test_main::{closure#0}>::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x61de8b277fa2 - <alloc[fef50e8eecedd288]::boxed::Box<dyn for<'a, 'b> core[6771d259883166e6]::ops::function::Fn<(&'a std[128c3efe2914e152]::panic::PanicHookInfo<'b>,), Output = ()> + core[6771d259883166e6]::marker::Sync + core[6771d259883166e6]::marker::Send> as core[6771d259883166e6]::ops::function::Fn<(&std[128c3efe2914e152]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/alloc/src/boxed.rs:2263:9
[INFO] [stdout]   14:     0x61de8b277fa2 - std[128c3efe2914e152]::panicking::panic_with_hook
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:833:13
[INFO] [stdout]   15:     0x61de8b25e708 - std[128c3efe2914e152]::panicking::panic_handler::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:698:13
[INFO] [stdout]   16:     0x61de8b2537c9 - std[128c3efe2914e152]::sys::backtrace::__rust_end_short_backtrace::<std[128c3efe2914e152]::panicking::panic_handler::{closure#0}, !>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/backtrace.rs:182:18
[INFO] [stdout]   17:     0x61de8b25f41d - __rustc[752cc74e29381ccc]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:689:5
[INFO] [stdout]   18:     0x61de8b29733c - core[6771d259883166e6]::panicking::panic_fmt
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/panicking.rs:80:14
[INFO] [stdout]   19:     0x61de8ab86422 - pyre_interpreter::eval::tests::test_list_slice::h0f1e464d77b29af0
[INFO] [stdout]                                at /opt/rustwide/workdir/src/eval.rs:2893:23
[INFO] [stdout]   20:     0x61de8ab86477 - pyre_interpreter::eval::tests::test_list_slice::{{closure}}::h323223c2b338b64f
[INFO] [stdout]                                at /opt/rustwide/workdir/src/eval.rs:2882:25
[INFO] [stdout]   21:     0x61de8ac0c8e6 - core::ops::function::FnOnce::call_once::h8ac1103f71fa073c
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   22:     0x61de8ac5c18b - <fn() -> core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String> as core[6771d259883166e6]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   23:     0x61de8ac5c18b - test[b137923399915ecf]::__rust_begin_short_backtrace::<core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String>, fn() -> core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:663:18
[INFO] [stdout]   24:     0x61de8ac68b5b - test[b137923399915ecf]::run_test_in_process::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:686:74
[INFO] [stdout]   25:     0x61de8ac68b5b - <core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<test[b137923399915ecf]::run_test_in_process::{closure#0}> as core[6771d259883166e6]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/panic/unwind_safe.rs:275:9
[INFO] [stdout]   26:     0x61de8ac68b5b - std[128c3efe2914e152]::panicking::catch_unwind::do_call::<core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<test[b137923399915ecf]::run_test_in_process::{closure#0}>, core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:581:40
[INFO] [stdout]   27:     0x61de8ac68b5b - std[128c3efe2914e152]::panicking::catch_unwind::<core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String>, core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<test[b137923399915ecf]::run_test_in_process::{closure#0}>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:544:19
[INFO] [stdout]   28:     0x61de8ac68b5b - std[128c3efe2914e152]::panic::catch_unwind::<core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<test[b137923399915ecf]::run_test_in_process::{closure#0}>, core[6771d259883166e6]::result::Result<(), alloc[fef50e8eecedd288]::string::String>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panic.rs:359:14
[INFO] [stdout]   29:     0x61de8ac68b5b - test[b137923399915ecf]::run_test_in_process
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:686:27
[INFO] [stdout]   30:     0x61de8ac68b5b - test[b137923399915ecf]::run_test::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:607:43
[INFO] [stdout]   31:     0x61de8ac62fb4 - test[b137923399915ecf]::run_test::{closure#1}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/test/src/lib.rs:637:41
[INFO] [stdout]   32:     0x61de8ac62fb4 - std[128c3efe2914e152]::sys::backtrace::__rust_begin_short_backtrace::<test[b137923399915ecf]::run_test::{closure#1}, ()>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/backtrace.rs:166:18
[INFO] [stdout]   33:     0x61de8ac6b762 - std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked::<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/thread/lifecycle.rs:91:13
[INFO] [stdout]   34:     0x61de8ac6b762 - <core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}> as core[6771d259883166e6]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/panic/unwind_safe.rs:275:9
[INFO] [stdout]   35:     0x61de8ac6b762 - std[128c3efe2914e152]::panicking::catch_unwind::do_call::<core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:581:40
[INFO] [stdout]   36:     0x61de8ac6b762 - std[128c3efe2914e152]::panicking::catch_unwind::<(), core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panicking.rs:544:19
[INFO] [stdout]   37:     0x61de8ac6b762 - std[128c3efe2914e152]::panic::catch_unwind::<core[6771d259883166e6]::panic::unwind_safe::AssertUnwindSafe<std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/panic.rs:359:14
[INFO] [stdout]   38:     0x61de8ac6b762 - std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked::<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/thread/lifecycle.rs:89:26
[INFO] [stdout]   39:     0x61de8ac6b762 - <std[128c3efe2914e152]::thread::lifecycle::spawn_unchecked<test[b137923399915ecf]::run_test::{closure#1}, ()>::{closure#1} as core[6771d259883166e6]::ops::function::FnOnce<()>>::call_once::{shim:vtable#0}
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   40:     0x61de8b27f2bf - <alloc[fef50e8eecedd288]::boxed::Box<dyn core[6771d259883166e6]::ops::function::FnOnce<(), Output = ()> + core[6771d259883166e6]::marker::Send> as core[6771d259883166e6]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/alloc/src/boxed.rs:2249:9
[INFO] [stdout]   41:     0x61de8b27f2bf - <std[128c3efe2914e152]::sys::thread::unix::Thread>::new::thread_start
[INFO] [stdout]                                at /rustc/8489f1adbe1c8f8921cf18b9962cf565237a5489/library/std/src/sys/thread/unix.rs:118:17
[INFO] [stdout]   42:     0x7fdab2526aa4 - <unknown>
[INFO] [stdout]   43:     0x7fdab25b3a64 - clone
[INFO] [stdout]   44:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     eval::tests::test_list_slice
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 173 passed; 1 failed; 1 ignored; 0 measured; 0 filtered out; finished in 1.08s
[INFO] [stdout] 
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] running `Command { std: "docker" "inspect" "4d761cf49f48c1e9733630b9588c8f173ba24767e10e50de4e52d0431d713d3e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "4d761cf49f48c1e9733630b9588c8f173ba24767e10e50de4e52d0431d713d3e", kill_on_drop: false }`
[INFO] [stdout] 4d761cf49f48c1e9733630b9588c8f173ba24767e10e50de4e52d0431d713d3e
