[INFO] fetching crate ezhook 0.2.2...
[INFO] testing ezhook-0.2.2 against master#d98a5da813da67eb189387b8ccfb73cf481275d8+rustflags=-Copt-level=3 for pr-138759
[INFO] extracting crate ezhook 0.2.2 into /workspace/builds/worker-6-tc1/source
[INFO] started tweaking crates.io crate ezhook 0.2.2
[INFO] finished tweaking crates.io crate ezhook 0.2.2
[INFO] tweaked toml for crates.io crate ezhook 0.2.2 written to /workspace/builds/worker-6-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate ezhook 0.2.2 on toolchain d98a5da813da67eb189387b8ccfb73cf481275d8
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]      Locking 5 packages to latest compatible versions
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded lde v0.3.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 8700707c724edadd425237487cfb338edc6f956fe7ae8a58bde94bae22f80178
[INFO] running `Command { std: "docker" "start" "-a" "8700707c724edadd425237487cfb338edc6f956fe7ae8a58bde94bae22f80178", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "8700707c724edadd425237487cfb338edc6f956fe7ae8a58bde94bae22f80178", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8700707c724edadd425237487cfb338edc6f956fe7ae8a58bde94bae22f80178", kill_on_drop: false }`
[INFO] [stdout] 8700707c724edadd425237487cfb338edc6f956fe7ae8a58bde94bae22f80178
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 36d12ba282ea89f3a8687a60627b460eb681ac8d9e1e7be5e6d46c9ff4bda431
[INFO] running `Command { std: "docker" "start" "-a" "36d12ba282ea89f3a8687a60627b460eb681ac8d9e1e7be5e6d46c9ff4bda431", kill_on_drop: false }`
[INFO] [stderr]    Compiling ezhook v0.2.2 (/opt/rustwide/workdir)
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.16s
[INFO] running `Command { std: "docker" "inspect" "36d12ba282ea89f3a8687a60627b460eb681ac8d9e1e7be5e6d46c9ff4bda431", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "36d12ba282ea89f3a8687a60627b460eb681ac8d9e1e7be5e6d46c9ff4bda431", kill_on_drop: false }`
[INFO] [stdout] 36d12ba282ea89f3a8687a60627b460eb681ac8d9e1e7be5e6d46c9ff4bda431
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 1c8e0e2e8c7d912808ad31ed3eb85c32b050f12345c7c04763d83ac23ff1330c
[INFO] running `Command { std: "docker" "start" "-a" "1c8e0e2e8c7d912808ad31ed3eb85c32b050f12345c7c04763d83ac23ff1330c", kill_on_drop: false }`
[INFO] [stderr]    Compiling ezhook v0.2.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:189:21
[INFO] [stdout]     |
[INFO] [stdout] 189 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout]     = note: `#[warn(unpredictable_function_pointer_comparisons)]` on by default
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 189 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 189 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:195:21
[INFO] [stdout]     |
[INFO] [stdout] 195 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 195 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 195 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:201:21
[INFO] [stdout]     |
[INFO] [stdout] 201 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 201 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 201 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:219:21
[INFO] [stdout]     |
[INFO] [stdout] 219 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 219 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout] 219 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:225:21
[INFO] [stdout]     |
[INFO] [stdout] 225 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 225 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout] 225 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/local/swap.rs:231:21
[INFO] [stdout]     |
[INFO] [stdout] 231 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 231 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stdout] 231 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/local/swap.rs:132:17
[INFO] [stdout]     |
[INFO] [stdout] 132 |                   __ez_HOOK.hook(target)
[INFO] [stdout]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 170 | /     local_swap_hook! {
[INFO] [stdout] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 172 | |             orig!(x + 1)
[INFO] [stdout] 173 | |         }
[INFO] [stdout] 174 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/local/swap.rs:137:17
[INFO] [stdout]     |
[INFO] [stdout] 137 |                   __ez_HOOK.unhook()
[INFO] [stdout]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 170 | /     local_swap_hook! {
[INFO] [stdout] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 172 | |             orig!(x + 1)
[INFO] [stdout] 173 | |         }
[INFO] [stdout] 174 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/local/swap.rs:142:17
[INFO] [stdout]     |
[INFO] [stdout] 142 |                   __ez_HOOK.toggle()
[INFO] [stdout]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 170 | /     local_swap_hook! {
[INFO] [stdout] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 172 | |             orig!(x + 1)
[INFO] [stdout] 173 | |         }
[INFO] [stdout] 174 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/local/swap.rs:147:17
[INFO] [stdout]     |
[INFO] [stdout] 147 |                   __ez_HOOK.target()
[INFO] [stdout]     |                   ^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 170 | /     local_swap_hook! {
[INFO] [stdout] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 172 | |             orig!(x + 1)
[INFO] [stdout] 173 | |         }
[INFO] [stdout] 174 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/remote/swap.rs:160:21
[INFO] [stdout]     |
[INFO] [stdout] 160 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 160 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 160 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/remote/swap.rs:166:21
[INFO] [stdout]     |
[INFO] [stdout] 166 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 166 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 166 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stdout]    --> src/remote/swap.rs:172:21
[INFO] [stdout]     |
[INFO] [stdout] 172 |             assert!(unsafe { hook.target() } == square);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: the address of the same function can vary between different codegen units
[INFO] [stdout]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stdout]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stdout] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stdout]     |
[INFO] [stdout] 172 -             assert!(unsafe { hook.target() } == square);
[INFO] [stdout] 172 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:98:44
[INFO] [stdout]     |
[INFO] [stdout] 98  |                   $crate::remote::swap::len(&__ez_hook::__ez_HOOK, __ez_hook::$name)
[INFO] [stdout]     |                                              ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 123 | /     remote_swap_hook! {
[INFO] [stdout] 124 | |         #[hook]
[INFO] [stdout] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 126 | |             orig!(x + 1)
[INFO] [stdout] 127 | |         }
[INFO] [stdout] 128 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing
[INFO] [stdout]    --> src/remote/swap.rs:102:24
[INFO] [stdout]     |
[INFO] [stdout] 102 |                   dest: &'static mut [u8],
[INFO] [stdout]     |                          ^^^^^^^ this lifetime flows to the output
[INFO] [stdout] 103 |               ) -> &mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stdout]     |                    ----------------------------------------- the lifetime gets resolved as `'static`
[INFO] [stdout] ...
[INFO] [stdout] 123 | /     remote_swap_hook! {
[INFO] [stdout] 124 | |         #[hook]
[INFO] [stdout] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 126 | |             orig!(x + 1)
[INFO] [stdout] 127 | |         }
[INFO] [stdout] 128 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] help: one option is to consistently use `'static`
[INFO] [stdout]     |
[INFO] [stdout] 103 |             ) -> &'static mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stdout]     |                   +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:104:48
[INFO] [stdout]     |
[INFO] [stdout] 104 |                   $crate::remote::swap::copy_to(&__ez_hook::__ez_HOOK, __ez_hook::$name, dest)
[INFO] [stdout]     |                                                  ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 123 | /     remote_swap_hook! {
[INFO] [stdout] 124 | |         #[hook]
[INFO] [stdout] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stdout] 126 | |             orig!(x + 1)
[INFO] [stdout] 127 | |         }
[INFO] [stdout] 128 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:56:33
[INFO] [stdout]     |
[INFO] [stdout] 56  |                                 __ez_HOOK.toggle_inline();
[INFO] [stdout]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 126 |             orig!(x + 1)
[INFO] [stdout]     |             ------------ in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:58:33
[INFO] [stdout]     |
[INFO] [stdout] 58  |                                 __ez_HOOK.target_inline()
[INFO] [stdout]     |                                 ^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 126 |             orig!(x + 1)
[INFO] [stdout]     |             ------------ in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:65:33
[INFO] [stdout]     |
[INFO] [stdout] 65  |                                 __ez_HOOK.toggle_inline();
[INFO] [stdout]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 126 |             orig!(x + 1)
[INFO] [stdout]     |             ------------ in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:98:44
[INFO] [stdout]     |
[INFO] [stdout] 98  |                   $crate::remote::swap::len(&__ez_hook::__ez_HOOK, __ez_hook::$name)
[INFO] [stdout]     |                                              ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 130 | /     remote_swap_hook! {
[INFO] [stdout] 131 | |         #[hook]
[INFO] [stdout] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stdout] 133 | |             update_last(orig!(x))
[INFO] [stdout] ...   |
[INFO] [stdout] 142 | |         static mut LAST: i32 = 0;
[INFO] [stdout] 143 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing
[INFO] [stdout]    --> src/remote/swap.rs:102:24
[INFO] [stdout]     |
[INFO] [stdout] 102 |                   dest: &'static mut [u8],
[INFO] [stdout]     |                          ^^^^^^^ this lifetime flows to the output
[INFO] [stdout] 103 |               ) -> &mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stdout]     |                    ----------------------------------------- the lifetime gets resolved as `'static`
[INFO] [stdout] ...
[INFO] [stdout] 130 | /     remote_swap_hook! {
[INFO] [stdout] 131 | |         #[hook]
[INFO] [stdout] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stdout] 133 | |             update_last(orig!(x))
[INFO] [stdout] ...   |
[INFO] [stdout] 142 | |         static mut LAST: i32 = 0;
[INFO] [stdout] 143 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] help: one option is to consistently use `'static`
[INFO] [stdout]     |
[INFO] [stdout] 103 |             ) -> &'static mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stdout]     |                   +++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:104:48
[INFO] [stdout]     |
[INFO] [stdout] 104 |                   $crate::remote::swap::copy_to(&__ez_hook::__ez_HOOK, __ez_hook::$name, dest)
[INFO] [stdout]     |                                                  ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 130 | /     remote_swap_hook! {
[INFO] [stdout] 131 | |         #[hook]
[INFO] [stdout] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stdout] 133 | |             update_last(orig!(x))
[INFO] [stdout] ...   |
[INFO] [stdout] 142 | |         static mut LAST: i32 = 0;
[INFO] [stdout] 143 | |     }
[INFO] [stdout]     | |_____- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:56:33
[INFO] [stdout]     |
[INFO] [stdout] 56  |                                 __ez_HOOK.toggle_inline();
[INFO] [stdout]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 133 |             update_last(orig!(x))
[INFO] [stdout]     |                         -------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:58:33
[INFO] [stdout]     |
[INFO] [stdout] 58  |                                 __ez_HOOK.target_inline()
[INFO] [stdout]     |                                 ^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 133 |             update_last(orig!(x))
[INFO] [stdout]     |                         -------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/remote/swap.rs:65:33
[INFO] [stdout]     |
[INFO] [stdout] 65  |                                 __ez_HOOK.toggle_inline();
[INFO] [stdout]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout] ...
[INFO] [stdout] 133 |             update_last(orig!(x))
[INFO] [stdout]     |                         -------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.86s
[INFO] running `Command { std: "docker" "inspect" "1c8e0e2e8c7d912808ad31ed3eb85c32b050f12345c7c04763d83ac23ff1330c", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "1c8e0e2e8c7d912808ad31ed3eb85c32b050f12345c7c04763d83ac23ff1330c", kill_on_drop: false }`
[INFO] [stdout] 1c8e0e2e8c7d912808ad31ed3eb85c32b050f12345c7c04763d83ac23ff1330c
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+d98a5da813da67eb189387b8ccfb73cf481275d8" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] babdf03768393de0fb60ef6fecf86ec55c12ca16adfd598166c436c4f2e426ab
[INFO] running `Command { std: "docker" "start" "-a" "babdf03768393de0fb60ef6fecf86ec55c12ca16adfd598166c436c4f2e426ab", kill_on_drop: false }`
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:189:21
[INFO] [stderr]     |
[INFO] [stderr] 189 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr]     = note: `#[warn(unpredictable_function_pointer_comparisons)]` on by default
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 189 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 189 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:195:21
[INFO] [stderr]     |
[INFO] [stderr] 195 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 195 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 195 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:201:21
[INFO] [stderr]     |
[INFO] [stderr] 201 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 201 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 201 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:219:21
[INFO] [stderr]     |
[INFO] [stderr] 219 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 219 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr] 219 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:225:21
[INFO] [stderr]     |
[INFO] [stderr] 225 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 225 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr] 225 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/local/swap.rs:231:21
[INFO] [stderr]     |
[INFO] [stderr] 231 |             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 231 -             assert!(unsafe { add_one_before::target() } == square);
[INFO] [stderr] 231 +             assert!(std::ptr::fn_addr_eq(unsafe { add_one_before::target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/local/swap.rs:132:17
[INFO] [stderr]     |
[INFO] [stderr] 132 |                   __ez_HOOK.hook(target)
[INFO] [stderr]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 170 | /     local_swap_hook! {
[INFO] [stderr] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 172 | |             orig!(x + 1)
[INFO] [stderr] 173 | |         }
[INFO] [stderr] 174 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stderr]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/local/swap.rs:137:17
[INFO] [stderr]     |
[INFO] [stderr] 137 |                   __ez_HOOK.unhook()
[INFO] [stderr]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 170 | /     local_swap_hook! {
[INFO] [stderr] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 172 | |             orig!(x + 1)
[INFO] [stderr] 173 | |         }
[INFO] [stderr] 174 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/local/swap.rs:142:17
[INFO] [stderr]     |
[INFO] [stderr] 142 |                   __ez_HOOK.toggle()
[INFO] [stderr]     |                   ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 170 | /     local_swap_hook! {
[INFO] [stderr] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 172 | |             orig!(x + 1)
[INFO] [stderr] 173 | |         }
[INFO] [stderr] 174 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/local/swap.rs:147:17
[INFO] [stderr]     |
[INFO] [stderr] 147 |                   __ez_HOOK.target()
[INFO] [stderr]     |                   ^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 170 | /     local_swap_hook! {
[INFO] [stderr] 171 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 172 | |             orig!(x + 1)
[INFO] [stderr] 173 | |         }
[INFO] [stderr] 174 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::local_swap_hook` which comes from the expansion of the macro `local_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/remote/swap.rs:160:21
[INFO] [stderr]     |
[INFO] [stderr] 160 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 160 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 160 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/remote/swap.rs:166:21
[INFO] [stderr]     |
[INFO] [stderr] 166 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 166 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 166 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: function pointer comparisons do not produce meaningful results since their addresses are not guaranteed to be unique
[INFO] [stderr]    --> src/remote/swap.rs:172:21
[INFO] [stderr]     |
[INFO] [stderr] 172 |             assert!(unsafe { hook.target() } == square);
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: the address of the same function can vary between different codegen units
[INFO] [stderr]     = note: furthermore, different functions could have the same address after being merged together
[INFO] [stderr]     = note: for more information visit <https://doc.rust-lang.org/nightly/core/ptr/fn.fn_addr_eq.html>
[INFO] [stderr] help: refactor your code, or use `std::ptr::fn_addr_eq` to suppress the lint
[INFO] [stderr]     |
[INFO] [stderr] 172 -             assert!(unsafe { hook.target() } == square);
[INFO] [stderr] 172 +             assert!(std::ptr::fn_addr_eq(unsafe { hook.target() }, square as fn(i32) -> i32));
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:98:44
[INFO] [stderr]     |
[INFO] [stderr] 98  |                   $crate::remote::swap::len(&__ez_hook::__ez_HOOK, __ez_hook::$name)
[INFO] [stderr]     |                                              ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 123 | /     remote_swap_hook! {
[INFO] [stderr] 124 | |         #[hook]
[INFO] [stderr] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 126 | |             orig!(x + 1)
[INFO] [stderr] 127 | |         }
[INFO] [stderr] 128 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: lifetime flowing from input to output with different syntax can be confusing
[INFO] [stderr]    --> src/remote/swap.rs:102:24
[INFO] [stderr]     |
[INFO] [stderr] 102 |                   dest: &'static mut [u8],
[INFO] [stderr]     |                          ^^^^^^^ this lifetime flows to the output
[INFO] [stderr] 103 |               ) -> &mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stderr]     |                    ----------------------------------------- the lifetime gets resolved as `'static`
[INFO] [stderr] ...
[INFO] [stderr] 123 | /     remote_swap_hook! {
[INFO] [stderr] 124 | |         #[hook]
[INFO] [stderr] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 126 | |             orig!(x + 1)
[INFO] [stderr] 127 | |         }
[INFO] [stderr] 128 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] help: one option is to consistently use `'static`
[INFO] [stderr]     |
[INFO] [stderr] 103 |             ) -> &'static mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stderr]     |                   +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:104:48
[INFO] [stderr]     |
[INFO] [stderr] 104 |                   $crate::remote::swap::copy_to(&__ez_hook::__ez_HOOK, __ez_hook::$name, dest)
[INFO] [stderr]     |                                                  ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 123 | /     remote_swap_hook! {
[INFO] [stderr] 124 | |         #[hook]
[INFO] [stderr] 125 | |         fn add_one_before(x: i32) -> i32 {
[INFO] [stderr] 126 | |             orig!(x + 1)
[INFO] [stderr] 127 | |         }
[INFO] [stderr] 128 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:56:33
[INFO] [stderr]     |
[INFO] [stderr] 56  |                                 __ez_HOOK.toggle_inline();
[INFO] [stderr]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 126 |             orig!(x + 1)
[INFO] [stderr]     |             ------------ in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:58:33
[INFO] [stderr]     |
[INFO] [stderr] 58  |                                 __ez_HOOK.target_inline()
[INFO] [stderr]     |                                 ^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 126 |             orig!(x + 1)
[INFO] [stderr]     |             ------------ in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:65:33
[INFO] [stderr]     |
[INFO] [stderr] 65  |                                 __ez_HOOK.toggle_inline();
[INFO] [stderr]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 126 |             orig!(x + 1)
[INFO] [stderr]     |             ------------ in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:98:44
[INFO] [stderr]     |
[INFO] [stderr] 98  |                   $crate::remote::swap::len(&__ez_hook::__ez_HOOK, __ez_hook::$name)
[INFO] [stderr]     |                                              ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 130 | /     remote_swap_hook! {
[INFO] [stderr] 131 | |         #[hook]
[INFO] [stderr] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stderr] 133 | |             update_last(orig!(x))
[INFO] [stderr] ...   |
[INFO] [stderr] 142 | |         static mut LAST: i32 = 0;
[INFO] [stderr] 143 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: lifetime flowing from input to output with different syntax can be confusing
[INFO] [stderr]    --> src/remote/swap.rs:102:24
[INFO] [stderr]     |
[INFO] [stderr] 102 |                   dest: &'static mut [u8],
[INFO] [stderr]     |                          ^^^^^^^ this lifetime flows to the output
[INFO] [stderr] 103 |               ) -> &mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stderr]     |                    ----------------------------------------- the lifetime gets resolved as `'static`
[INFO] [stderr] ...
[INFO] [stderr] 130 | /     remote_swap_hook! {
[INFO] [stderr] 131 | |         #[hook]
[INFO] [stderr] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stderr] 133 | |             update_last(orig!(x))
[INFO] [stderr] ...   |
[INFO] [stderr] 142 | |         static mut LAST: i32 = 0;
[INFO] [stderr] 143 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] help: one option is to consistently use `'static`
[INFO] [stderr]     |
[INFO] [stderr] 103 |             ) -> &'static mut $crate::local::swap::Hook<__ez_Func> {
[INFO] [stderr]     |                   +++++++
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:104:48
[INFO] [stderr]     |
[INFO] [stderr] 104 |                   $crate::remote::swap::copy_to(&__ez_hook::__ez_HOOK, __ez_hook::$name, dest)
[INFO] [stderr]     |                                                  ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 130 | /     remote_swap_hook! {
[INFO] [stderr] 131 | |         #[hook]
[INFO] [stderr] 132 | |         fn delayed(x: i32) -> i32 {
[INFO] [stderr] 133 | |             update_last(orig!(x))
[INFO] [stderr] ...   |
[INFO] [stderr] 142 | |         static mut LAST: i32 = 0;
[INFO] [stderr] 143 | |     }
[INFO] [stderr]     | |_____- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `$crate::remote_swap_hook` which comes from the expansion of the macro `remote_swap_hook` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:56:33
[INFO] [stderr]     |
[INFO] [stderr] 56  |                                 __ez_HOOK.toggle_inline();
[INFO] [stderr]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 133 |             update_last(orig!(x))
[INFO] [stderr]     |                         -------- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a shared reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:58:33
[INFO] [stderr]     |
[INFO] [stderr] 58  |                                 __ez_HOOK.target_inline()
[INFO] [stderr]     |                                 ^^^^^^^^^ shared reference to mutable static
[INFO] [stdout] 
[INFO] [stderr] ...
[INFO] [stdout] running 6 tests
[INFO] [stderr] 133 |             update_last(orig!(x))
[INFO] [stderr]     |                         -------- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: creating a mutable reference to mutable static
[INFO] [stderr]    --> src/remote/swap.rs:65:33
[INFO] [stderr]     |
[INFO] [stderr] 65  |                                 __ez_HOOK.toggle_inline();
[INFO] [stderr]     |                                 ^^^^^^^^^ mutable reference to mutable static
[INFO] [stderr] ...
[INFO] [stderr] 133 |             update_last(orig!(x))
[INFO] [stderr]     |                         -------- in this macro invocation
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stderr]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stderr]     = note: this warning originates in the macro `orig` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stderr] 
[INFO] [stderr] warning: `ezhook` (lib test) generated 25 warnings
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.04s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/ezhook-1bdfa61f6b4e6fba)
[INFO] [stdout] test remote::swap::tests::hook_macro_state ... ok
[INFO] [stdout] test local::swap::tests::hook_multiple ... ok
[INFO] [stdout] test local::swap::tests::hook ... ok
[INFO] [stdout] test remote::swap::tests::hook_macro_multiple ... ok
[INFO] [stdout] test remote::swap::tests::hook_macro ... ok
[INFO] [stdout] test local::swap::tests::hook_macro ... FAILED
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- local::swap::tests::hook_macro stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'local::swap::tests::hook_macro' panicked at src/local/swap.rs:28:57:
[INFO] [stdout] called `Result::unwrap()` on an `Err` value: TryFromIntError(())
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x5fac23d72a52 - std::backtrace_rs::backtrace::libunwind::trace::hd39b1f53d3cf9745
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x5fac23d72a52 - std::backtrace_rs::backtrace::trace_unsynchronized::he91d9a75d4e3972b
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x5fac23d72a52 - std::sys::backtrace::_print_fmt::hca46938f8c6e22cf
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/backtrace.rs:66:9
[INFO] [stdout]    3:     0x5fac23d72a52 - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::ha499add612cccf8e
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/backtrace.rs:39:26
[INFO] [stdout]    4:     0x5fac23d97ae3 - core::fmt::rt::Argument::fmt::hd21145b75a833b7a
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/fmt/rt.rs:173:76
[INFO] [stdout]    5:     0x5fac23d97ae3 - core::fmt::write::hb10c956f5235c8a4
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/fmt/mod.rs:1465:25
[INFO] [stdout]    6:     0x5fac23d6fc33 - std::io::default_write_fmt::hdb7615052be2ba4d
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/io/mod.rs:639:11
[INFO] [stdout]    7:     0x5fac23d6fc33 - std::io::Write::write_fmt::he1bcd251ec6e4153
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/io/mod.rs:1954:13
[INFO] [stdout]    8:     0x5fac23d728a2 - std::sys::backtrace::BacktraceLock::print::hb47c770ef659fd10
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/backtrace.rs:42:9
[INFO] [stdout]    9:     0x5fac23d73fbc - std::panicking::default_hook::{{closure}}::hdda8afb9d457a22c
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:300:27
[INFO] [stdout]   10:     0x5fac23d73e12 - std::panicking::default_hook::h7c46b44874fe5c9a
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:324:9
[INFO] [stdout]   11:     0x5fac23d3bef4 - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h178a5fcedee41e2f
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   12:     0x5fac23d3bef4 - test::test_main_with_exit_callback::{{closure}}::h951a41e0149d6d5d
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x5fac23d7499b - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h13602080f5b63276
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   14:     0x5fac23d7499b - std::panicking::rust_panic_with_hook::ha6cb99ed099eb1c5
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:841:13
[INFO] [stdout]   15:     0x5fac23d7476a - std::panicking::begin_panic_handler::{{closure}}::he11808bc797ee921
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:706:13
[INFO] [stdout]   16:     0x5fac23d72f49 - std::sys::backtrace::__rust_end_short_backtrace::h9418807cb7346258
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/backtrace.rs:168:18
[INFO] [stdout]   17:     0x5fac23d743fd - __rustc[18fb429eef004894]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:697:5
[INFO] [stdout]   18:     0x5fac23d96660 - core::panicking::panic_fmt::hd890aeb12c3a3fc3
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/panicking.rs:75:14
[INFO] [stdout]   19:     0x5fac23d969d6 - core::result::unwrap_failed::h31c9775ec1a50121
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/result.rs:1761:5
[INFO] [stdout]   20:     0x5fac23d01943 - core::result::Result<T,E>::unwrap::h056c900cf2512e90
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/result.rs:1167:23
[INFO] [stdout]   21:     0x5fac23d01943 - ezhook::local::swap::Hook<T>::hook::he09e12f685f30c9a
[INFO] [stdout]                                at /opt/rustwide/workdir/src/local/swap.rs:28:57
[INFO] [stdout]   22:     0x5fac23d01943 - ezhook::local::swap::tests::add_one_before::hook::h2d4e9df9ce99c944
[INFO] [stdout]                                at /opt/rustwide/workdir/src/local/swap.rs:132:27
[INFO] [stdout]   23:     0x5fac23d01943 - ezhook::local::swap::tests::hook_macro::h4503f30b67b96258
[INFO] [stdout]                                at /opt/rustwide/workdir/src/local/swap.rs:217:22
[INFO] [stdout]   24:     0x5fac23d01943 - ezhook::local::swap::tests::hook_macro::{{closure}}::h2de7f47fa4ce1ceb
[INFO] [stdout]                                at /opt/rustwide/workdir/src/local/swap.rs:213:20
[INFO] [stdout]   25:     0x5fac23d01943 - core::ops::function::FnOnce::call_once::h25b4d0487cafbc44
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   26:     0x5fac23d4167b - core::ops::function::FnOnce::call_once::h2869fb5b0a2b0bdc
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   27:     0x5fac23d4167b - test::__rust_begin_short_backtrace::h7dd7142bd62fa711
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:648:18
[INFO] [stdout]   28:     0x5fac23d4086e - test::run_test_in_process::{{closure}}::h43a753f038d36b3f
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:671:74
[INFO] [stdout]   29:     0x5fac23d4086e - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h0ca95dd3e12d1e16
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   30:     0x5fac23d4086e - std::panicking::catch_unwind::do_call::he308587d70ac34ba
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:589:40
[INFO] [stdout]   31:     0x5fac23d4086e - std::panicking::catch_unwind::h30dcba31973e8fb0
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:552:19
[INFO] [stdout]   32:     0x5fac23d4086e - std::panic::catch_unwind::hfb68364e5621fbee
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panic.rs:359:14
[INFO] [stdout]   33:     0x5fac23d4086e - test::run_test_in_process::hcdcc2977903b998a
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:671:27
[INFO] [stdout]   34:     0x5fac23d4086e - test::run_test::{{closure}}::h544a6550958c5d14
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:592:43
[INFO] [stdout]   35:     0x5fac23d043e4 - test::run_test::{{closure}}::hb172e48ebe2b92c7
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/test/src/lib.rs:622:41
[INFO] [stdout]   36:     0x5fac23d043e4 - std::sys::backtrace::__rust_begin_short_backtrace::h7e79d8706638bea0
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/backtrace.rs:152:18
[INFO] [stdout]   37:     0x5fac23d07dba - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::hc4a275f1e71b8ab0
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/thread/mod.rs:559:17
[INFO] [stdout]   38:     0x5fac23d07dba - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h01ed0d242df78cfd
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   39:     0x5fac23d07dba - std::panicking::catch_unwind::do_call::h052f373fb905fee0
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:589:40
[INFO] [stdout]   40:     0x5fac23d07dba - std::panicking::catch_unwind::hb425d20c8ffb09c8
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panicking.rs:552:19
[INFO] [stdout]   41:     0x5fac23d07dba - std::panic::catch_unwind::ha0d5dfbf18fdeda5
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/panic.rs:359:14
[INFO] [stdout]   42:     0x5fac23d07dba - std::thread::Builder::spawn_unchecked_::{{closure}}::hbe79182bd37949c7
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/thread/mod.rs:557:30
[INFO] [stdout]   43:     0x5fac23d07dba - core::ops::function::FnOnce::call_once{{vtable.shim}}::hc096c4a06972fde5
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   44:     0x5fac23d778f7 - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h47377e27fb938a26
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/alloc/src/boxed.rs:1971:9
[INFO] [stdout]   45:     0x5fac23d778f7 - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h72f1fe5d095abf57
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/alloc/src/boxed.rs:1971:9
[INFO] [stdout]   46:     0x5fac23d778f7 - std::sys::pal::unix::thread::Thread::new::thread_start::h0a4d8e1b9c0d38cf
[INFO] [stdout]                                at /rustc/d98a5da813da67eb189387b8ccfb73cf481275d8/library/std/src/sys/pal/unix/thread.rs:97:17
[INFO] [stdout]   47:     0x7baaab876aa4 - <unknown>
[INFO] [stdout]   48:     0x7baaab903a34 - clone
[INFO] [stdout]   49:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     local::swap::tests::hook_macro
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 5 passed; 1 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.06s
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "babdf03768393de0fb60ef6fecf86ec55c12ca16adfd598166c436c4f2e426ab", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "babdf03768393de0fb60ef6fecf86ec55c12ca16adfd598166c436c4f2e426ab", kill_on_drop: false }`
[INFO] [stdout] babdf03768393de0fb60ef6fecf86ec55c12ca16adfd598166c436c4f2e426ab
