[INFO] fetching crate hpm-rt 0.1.0...
[INFO] testing hpm-rt-0.1.0 against try#c2e32f1c9652b13ed99608599c1e855462f421f3 for pr-146098-7
[INFO] extracting crate hpm-rt 0.1.0 into /workspace/builds/worker-3-tc2/source
[INFO] started tweaking crates.io crate hpm-rt 0.1.0
[INFO] finished tweaking crates.io crate hpm-rt 0.1.0
[INFO] tweaked toml for crates.io crate hpm-rt 0.1.0 written to /workspace/builds/worker-3-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate hpm-rt 0.1.0 on toolchain c2e32f1c9652b13ed99608599c1e855462f421f3
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]      Locking 15 packages to latest compatible versions
[INFO] [stderr]       Adding panic-halt v0.2.0 (available: v1.0.0)
[INFO] [stderr]       Adding riscv v0.10.1 (available: v0.15.0)
[INFO] [stderr]       Adding riscv-rt-macros v0.2.2 (available: v0.6.0)
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] dd623abc6331299b70328956a84d8a9112b492957d023b53a952aa935592ebc8
[INFO] running `Command { std: "docker" "start" "-a" "dd623abc6331299b70328956a84d8a9112b492957d023b53a952aa935592ebc8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "dd623abc6331299b70328956a84d8a9112b492957d023b53a952aa935592ebc8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "dd623abc6331299b70328956a84d8a9112b492957d023b53a952aa935592ebc8", kill_on_drop: false }`
[INFO] [stdout] dd623abc6331299b70328956a84d8a9112b492957d023b53a952aa935592ebc8
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f1b8bd7e4b63083b17c9f4e84c040fc03b8447467b7d170a6d710b93c88ea410
[INFO] running `Command { std: "docker" "start" "-a" "f1b8bd7e4b63083b17c9f4e84c040fc03b8447467b7d170a6d710b93c88ea410", kill_on_drop: false }`
[INFO] [stderr]    Compiling proc-macro2 v1.0.103
[INFO] [stderr]    Compiling unicode-ident v1.0.22
[INFO] [stderr]    Compiling quote v1.0.42
[INFO] [stderr]    Compiling nb v1.1.0
[INFO] [stderr]    Compiling riscv v0.10.1
[INFO] [stderr]    Compiling void v1.0.2
[INFO] [stderr]    Compiling bit_field v0.10.3
[INFO] [stderr]    Compiling critical-section v1.2.0
[INFO] [stderr]    Compiling r0 v1.0.0
[INFO] [stderr]    Compiling cfg-if v1.0.4
[INFO] [stderr]    Compiling nb v0.1.3
[INFO] [stderr]    Compiling embedded-hal v0.2.7
[INFO] [stderr]    Compiling syn v2.0.110
[INFO] [stderr]    Compiling riscv-rt-macros v0.2.2
[INFO] [stderr]    Compiling hpm-rt v0.1.0 (/opt/rustwide/workdir)
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 7.36s
[INFO] running `Command { std: "docker" "inspect" "f1b8bd7e4b63083b17c9f4e84c040fc03b8447467b7d170a6d710b93c88ea410", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f1b8bd7e4b63083b17c9f4e84c040fc03b8447467b7d170a6d710b93c88ea410", kill_on_drop: false }`
[INFO] [stdout] f1b8bd7e4b63083b17c9f4e84c040fc03b8447467b7d170a6d710b93c88ea410
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] e6442eeab0b440a9900cded74a607dbc52f99e157e72dfec1d03517a33588b9b
[INFO] running `Command { std: "docker" "start" "-a" "e6442eeab0b440a9900cded74a607dbc52f99e157e72dfec1d03517a33588b9b", kill_on_drop: false }`
[INFO] [stderr]    Compiling panic-halt v0.2.0
[INFO] [stderr]    Compiling hpm-rt v0.1.0 (/opt/rustwide/workdir)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.54s
[INFO] running `Command { std: "docker" "inspect" "e6442eeab0b440a9900cded74a607dbc52f99e157e72dfec1d03517a33588b9b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e6442eeab0b440a9900cded74a607dbc52f99e157e72dfec1d03517a33588b9b", kill_on_drop: false }`
[INFO] [stdout] e6442eeab0b440a9900cded74a607dbc52f99e157e72dfec1d03517a33588b9b
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] 69965d2787a08584e73d0367586eaeafabc806ac0f03d27cc7e71d69d201bf7c
[INFO] running `Command { std: "docker" "start" "-a" "69965d2787a08584e73d0367586eaeafabc806ac0f03d27cc7e71d69d201bf7c", kill_on_drop: false }`
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.04s
[INFO] [stdout] 
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/hpm_rt-ecdfb74053dc4eea)
[INFO] [stdout] running 1 test
[INFO] [stdout] MEMORY 
[INFO] [stdout] {
[INFO] [stdout] ILM : ORIGIN = 0x00000000, LENGTH = 0x00040000
[INFO] [stdout] DLM : ORIGIN = 0x00080000, LENGTH = 0x00040000
[INFO] [stdout] AXI_SRAM_0 : ORIGIN = 0x01080000, LENGTH = 0x00080000
[INFO] [stdout] AXI_SRAM_1 : ORIGIN = 0x01100000, LENGTH = 0x00080000
[INFO] [stdout] AHB_SRAM : ORIGIN = 0xF0300000, LENGTH = 0x00008000
[INFO] [stdout] APB_SRAM : ORIGIN = 0xF40F0000, LENGTH = 0x00002000
[INFO] [stdout] XPI0 : ORIGIN = 0x80000000, LENGTH = 0x00080000
[INFO] [stdout] XPI1 : ORIGIN = 0x90000000, LENGTH = 0x00000000
[INFO] [stdout] }
[INFO] [stdout] REGION_ALIAS("REGION_TEXT", XPI0);
[INFO] [stdout] REGION_ALIAS("REGION_RODATA", XPI0);
[INFO] [stdout] REGION_ALIAS("REGION_DATA", DLM);
[INFO] [stdout] REGION_ALIAS("REGION_BSS", DLM);
[INFO] [stdout] REGION_ALIAS("REGION_STACK", DLM);
[INFO] [stdout] REGION_ALIAS("REGION_HEAP", DLM);
[INFO] [stdout] REGION_ALIAS("REGION_LOAD_TEXT", XPI0);
[INFO] [stdout] REGION_ALIAS("REGION_LOAD_RODATA", XPI0);
[INFO] [stdout] REGION_ALIAS("REGION_LOAD_DATA", XPI0);
[INFO] [stdout] REGION_ALIAS("REGION_BOOT_FLASH", XPI0);
[INFO] [stdout] SECTIONS
[INFO] [stdout] {
[INFO] [stdout] .nor_cfg_option ORIGIN(REGION_BOOT_FLASH):
[INFO] [stdout] {
[INFO] [stdout] . += 0x400;
[INFO] [stdout] LONG(0xFCF90002);
[INFO] [stdout] LONG(0x00000007);
[INFO] [stdout] LONG(0x00000000);
[INFO] [stdout] } > REGION_BOOT_FLASH
[INFO] [stdout] }
[INFO] [stdout] SECTIONS
[INFO] [stdout] {
[INFO] [stdout]   .boot_header :
[INFO] [stdout]   {
[INFO] [stdout]     . = ORIGIN(REGION_BOOT_FLASH) + 0x1000;
[INFO] [stdout]     __boot_header = .;
[INFO] [stdout] 
[INFO] [stdout]     KEEP(*(.boot_header));
[INFO] [stdout] 
[INFO] [stdout]     . = ORIGIN(REGION_BOOT_FLASH) + 0x3000;
[INFO] [stdout]     __app_load_addr__ = .;
[INFO] [stdout]     __app_offset__ = __app_load_addr__ - __boot_header;
[INFO] [stdout]   } > REGION_BOOT_FLASH
[INFO] [stdout] }
[INFO] [stdout] PROVIDE(_stext = __app_load_addr__);
[INFO] [stdout] PROVIDE(_stack_start = ORIGIN(REGION_STACK) + LENGTH(REGION_STACK));
[INFO] [stdout] PROVIDE(_max_hart_id = 0);
[INFO] [stdout] PROVIDE(_hart_stack_size = 2K);
[INFO] [stdout] PROVIDE(_heap_size = 0);
[INFO] [stdout] 
[INFO] [stdout] PROVIDE(UserSoft = DefaultHandler);
[INFO] [stdout] PROVIDE(SupervisorSoft = DefaultHandler);
[INFO] [stdout] PROVIDE(MachineSoft = DefaultHandler);
[INFO] [stdout] PROVIDE(UserTimer = DefaultHandler);
[INFO] [stdout] PROVIDE(SupervisorTimer = DefaultHandler);
[INFO] [stdout] PROVIDE(MachineTimer = DefaultHandler);
[INFO] [stdout] PROVIDE(UserExternal = DefaultHandler);
[INFO] [stdout] PROVIDE(SupervisorExternal = DefaultHandler);
[INFO] [stdout] PROVIDE(MachineExternal = DefaultHandler);
[INFO] [stdout] 
[INFO] [stdout] PROVIDE(DefaultHandler = DefaultInterruptHandler);
[INFO] [stdout] PROVIDE(ExceptionHandler = DefaultExceptionHandler);
[INFO] [stdout] 
[INFO] [stdout] /* # Pre-initialization function */
[INFO] [stdout] /* If the user overrides this using the `#[pre_init]` attribute or by creating a `__pre_init` function,
[INFO] [stdout]    then the function this points to will be called before the RAM is initialized. */
[INFO] [stdout] PROVIDE(__pre_init = default_pre_init);
[INFO] [stdout] 
[INFO] [stdout] /* A PAC/HAL defined routine that should initialize custom interrupt controller if needed. */
[INFO] [stdout] PROVIDE(_setup_interrupts = default_setup_interrupts);
[INFO] [stdout] 
[INFO] [stdout] /* # Multi-processing hook function
[INFO] [stdout]    fn _mp_hook() -> bool;
[INFO] [stdout] 
[INFO] [stdout]    This function is called from all the harts and must return true only for one hart,
[INFO] [stdout]    which will perform memory initialization. For other harts it must return false
[INFO] [stdout]    and implement wake-up in platform-dependent way (e.g. after waiting for a user interrupt).
[INFO] [stdout] */
[INFO] [stdout] PROVIDE(_mp_hook = default_mp_hook);
[INFO] [stdout] 
[INFO] [stdout] /* # Start trap function override
[INFO] [stdout]   By default uses the riscv crates default trap handler
[INFO] [stdout]   but by providing the `_start_trap` symbol external crates can override.
[INFO] [stdout] */
[INFO] [stdout] PROVIDE(_start_trap = default_start_trap);
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] SECTIONS
[INFO] [stdout] {
[INFO] [stdout]   .text _stext :
[INFO] [stdout]   {
[INFO] [stdout]     /* Put reset handler first in .text section so it ends up as the entry */
[INFO] [stdout]     /* point of the program. */
[INFO] [stdout]     KEEP(*(.init));
[INFO] [stdout]     KEEP(*(.init.rust));
[INFO] [stdout]     . = ALIGN(4);
[INFO] [stdout]     *(.trap);
[INFO] [stdout]     *(.trap.rust);
[INFO] [stdout] 
[INFO] [stdout]     *(.text .text.*);
[INFO] [stdout]   } >REGION_TEXT AT> REGION_LOAD_TEXT
[INFO] [stdout] 
[INFO] [stdout]   .rodata : ALIGN(4)
[INFO] [stdout]   {
[INFO] [stdout]     *(.srodata .srodata.*);
[INFO] [stdout]     *(.rodata .rodata.*);
[INFO] [stdout] 
[INFO] [stdout]     /* 4-byte align the end (VMA) of this section.
[INFO] [stdout]        This is required by LLD to ensure the LMA of the following .data
[INFO] [stdout]        section will have the correct alignment. */
[INFO] [stdout]     . = ALIGN(4);
[INFO] [stdout]   } > REGION_RODATA AT> REGION_LOAD_RODATA
[INFO] [stdout] 
[INFO] [stdout]   .data : ALIGN(4)
[INFO] [stdout]   {
[INFO] [stdout]     _sidata = LOADADDR(.data);
[INFO] [stdout]     _sdata = .;
[INFO] [stdout]     /* Must be called __global_pointer$ for linker relaxations to work. */
[INFO] [stdout]     PROVIDE(__global_pointer$ = . + 0x800);
[INFO] [stdout]     *(.sdata .sdata.* .sdata2 .sdata2.*);
[INFO] [stdout]     *(.data .data.*);
[INFO] [stdout]     . = ALIGN(4);
[INFO] [stdout]     _edata = .;
[INFO] [stdout]   } > REGION_DATA AT> REGION_LOAD_DATA
[INFO] [stdout] 
[INFO] [stdout]   __fw_size__ = _sidata - _stext + SIZEOF(.data);
[INFO] [stdout] 
[INFO] [stdout]   .bss (NOLOAD) :
[INFO] [stdout]   {
[INFO] [stdout]     _sbss = .;
[INFO] [stdout]     *(.sbss .sbss.* .bss .bss.*);
[INFO] [stdout]     . = ALIGN(4);
[INFO] [stdout]     _ebss = .;
[INFO] [stdout]   } > REGION_BSS
[INFO] [stdout] 
[INFO] [stdout]   /* fictitious region that represents the memory available for the heap */
[INFO] [stdout]   .heap (NOLOAD) :
[INFO] [stdout]   {
[INFO] [stdout]     _sheap = .;
[INFO] [stdout]     . += _heap_size;
[INFO] [stdout]     . = ALIGN(4);
[INFO] [stdout]     _eheap = .;
[INFO] [stdout]   } > REGION_HEAP
[INFO] [stdout] 
[INFO] [stdout]   /* fictitious region that represents the memory available for the stack */
[INFO] [stdout]   .stack (NOLOAD) :
[INFO] [stdout]   {
[INFO] [stdout]     _estack = .;
[INFO] [stdout]     . = ABSOLUTE(_stack_start);
[INFO] [stdout]     _sstack = .;
[INFO] [stdout]   } > REGION_STACK
[INFO] [stdout] 
[INFO] [stdout]   /* fake output .got section */
[INFO] [stdout]   /* Dynamic relocations are unsupported. This section is only used to detect
[INFO] [stdout]      relocatable code in the input files and raise an error if relocatable code
[INFO] [stdout]      is found */
[INFO] [stdout]   .got (INFO) :
[INFO] [stdout]   {
[INFO] [stdout]     KEEP(*(.got .got.*));
[INFO] [stdout]   }
[INFO] [stdout] 
[INFO] [stdout]   .eh_frame (INFO) : { KEEP(*(.eh_frame)) }
[INFO] [stdout]   .eh_frame_hdr (INFO) : { *(.eh_frame_hdr) }
[INFO] [stdout] }
[INFO] [stdout] 
[INFO] [stdout] /* Do not exceed this mark in the error messages above                                    | */
[INFO] [stdout] ASSERT(ORIGIN(REGION_TEXT) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_TEXT must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(ORIGIN(REGION_RODATA) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_RODATA must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(ORIGIN(REGION_DATA) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_DATA must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(ORIGIN(REGION_HEAP) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_HEAP must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(ORIGIN(REGION_TEXT) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_TEXT must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(ORIGIN(REGION_STACK) % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): the start of the REGION_STACK must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_stext % 4 == 0, "
[INFO] [stdout] ERROR(riscv-rt): `_stext` must be 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_sdata % 4 == 0 && _edata % 4 == 0, "
[INFO] [stdout] BUG(riscv-rt): .data is not 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_sidata % 4 == 0, "
[INFO] [stdout] BUG(riscv-rt): the LMA of .data is not 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_sbss % 4 == 0 && _ebss % 4 == 0, "
[INFO] [stdout] BUG(riscv-rt): .bss is not 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_sheap % 4 == 0, "
[INFO] [stdout] BUG(riscv-rt): start of .heap is not 4-byte aligned");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(_stext + SIZEOF(.text) < ORIGIN(REGION_TEXT) + LENGTH(REGION_TEXT), "
[INFO] [stdout] ERROR(riscv-rt): The .text section must be placed inside the REGION_TEXT region.
[INFO] [stdout] Set _stext to an address smaller than 'ORIGIN(REGION_TEXT) + LENGTH(REGION_TEXT)'");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(SIZEOF(.stack) > (_max_hart_id + 1) * _hart_stack_size, "
[INFO] [stdout] ERROR(riscv-rt): .stack section is too small for allocating stacks for all the harts.
[INFO] [stdout] Consider changing `_max_hart_id` or `_hart_stack_size`.");
[INFO] [stdout] 
[INFO] [stdout] ASSERT(SIZEOF(.got) == 0, "
[INFO] [stdout] .got section detected in the input files. Dynamic relocations are not
[INFO] [stdout] supported. If you are linking to C code compiled using the `gcc` crate
[INFO] [stdout] then modify your build script to compile the C code _without_ the
[INFO] [stdout] -fPIC flag. See the documentation of the `gcc::Config.fpic` method for
[INFO] [stdout] details.");
[INFO] [stdout] test host::image::tests::write_memory ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
[INFO] [stdout] 
[INFO] [stderr]    Doc-tests hpm_rt
[INFO] [stdout] 
[INFO] [stdout] running 2 tests
[INFO] [stdout] test src/lib.rs - (line 28) - compile ... ok
[INFO] [stdout] test src/lib.rs - (line 13) - compile ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 2 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.08s
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "69965d2787a08584e73d0367586eaeafabc806ac0f03d27cc7e71d69d201bf7c", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "69965d2787a08584e73d0367586eaeafabc806ac0f03d27cc7e71d69d201bf7c", kill_on_drop: false }`
[INFO] [stdout] 69965d2787a08584e73d0367586eaeafabc806ac0f03d27cc7e71d69d201bf7c
