[INFO] fetching crate tanton_engine 1.0.0...
[INFO] testing tanton_engine-1.0.0 against try#c2e32f1c9652b13ed99608599c1e855462f421f3 for pr-146098-8
[INFO] extracting crate tanton_engine 1.0.0 into /workspace/builds/worker-5-tc2/source
[INFO] started tweaking crates.io crate tanton_engine 1.0.0
[INFO] finished tweaking crates.io crate tanton_engine 1.0.0
[INFO] tweaked toml for crates.io crate tanton_engine 1.0.0 written to /workspace/builds/worker-5-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate tanton_engine 1.0.0 on toolchain c2e32f1c9652b13ed99608599c1e855462f421f3
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate tanton_engine 1.0.0 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2024
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 8d69df2c4448df563020f208d934f8f048226432b41c4883c6400789825d103a
[INFO] running `Command { std: "docker" "start" "-a" "8d69df2c4448df563020f208d934f8f048226432b41c4883c6400789825d103a", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "8d69df2c4448df563020f208d934f8f048226432b41c4883c6400789825d103a", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8d69df2c4448df563020f208d934f8f048226432b41c4883c6400789825d103a", kill_on_drop: false }`
[INFO] [stdout] 8d69df2c4448df563020f208d934f8f048226432b41c4883c6400789825d103a
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c2e32f1c9652b13ed99608599c1e855462f421f3" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 8d1ca3421b4ba6f758c8b98e15b46fe5d6f6c6492e11936101017f3b819d5d82
[INFO] running `Command { std: "docker" "start" "-a" "8d1ca3421b4ba6f758c8b98e15b46fe5d6f6c6492e11936101017f3b819d5d82", kill_on_drop: false }`
[INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2024
[INFO] [stderr]    Compiling libc v0.2.137
[INFO] [stderr]    Compiling crossbeam-utils v0.8.14
[INFO] [stderr]    Compiling memoffset v0.7.1
[INFO] [stderr]    Compiling crossbeam-epoch v0.9.13
[INFO] [stderr]    Compiling num-traits v0.2.15
[INFO] [stderr]    Compiling rayon-core v1.10.1
[INFO] [stderr]    Compiling mucow v0.1.0
[INFO] [stderr]    Compiling crossbeam-channel v0.5.6
[INFO] [stderr]    Compiling getrandom v0.2.8
[INFO] [stderr]    Compiling num_cpus v1.14.0
[INFO] [stderr]    Compiling time v0.1.45
[INFO] [stderr]    Compiling rand_core v0.6.4
[INFO] [stderr]    Compiling crossbeam-deque v0.8.2
[INFO] [stderr]    Compiling rand_chacha v0.3.1
[INFO] [stderr]    Compiling rand v0.8.5
[INFO] [stderr]    Compiling num-integer v0.1.45
[INFO] [stderr]    Compiling rayon v1.6.0
[INFO] [stderr]    Compiling chrono v0.4.23
[INFO] [stderr]    Compiling tanton v1.0.0
[INFO] [stderr]    Compiling tanton_engine v1.0.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unexpected `cfg` condition value: `dev`
[INFO] [stdout]  --> src/lib.rs:9:13
[INFO] [stdout]   |
[INFO] [stdout] 9 | #![cfg_attr(feature = "dev", allow(unstable_features))]
[INFO] [stdout]   |             ^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `nightly`
[INFO] [stdout]   = help: consider adding `dev` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]   = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary parentheses around const expression
[INFO] [stdout]   --> src/tables/butterfly.rs:10:15
[INFO] [stdout]    |
[INFO] [stdout] 10 |     a: [[i16; (SQ_CNT * SQ_CNT)]; PLAYER_CNT],
[INFO] [stdout]    |               ^               ^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_parens)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] help: remove these parentheses
[INFO] [stdout]    |
[INFO] [stdout] 10 -     a: [[i16; (SQ_CNT * SQ_CNT)]; PLAYER_CNT],
[INFO] [stdout] 10 +     a: [[i16; SQ_CNT * SQ_CNT ]; PLAYER_CNT],
[INFO] [stdout]    |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/consts.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let tt = &mut TT_TABLE as *mut DummyTranspositionTable as *mut TranspositionTable;
[INFO] [stdout]    |                  ^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let tt = &raw mut TT_TABLE as *mut DummyTranspositionTable as *mut TranspositionTable;
[INFO] [stdout]    |                   +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/consts.rs:68:39
[INFO] [stdout]    |
[INFO] [stdout] 68 |         let timer: *mut TimeManager = &mut TIMER as *mut DummyTimeManager as *mut TimeManager;
[INFO] [stdout]    |                                       ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 68 |         let timer: *mut TimeManager = &raw mut TIMER as *mut DummyTimeManager as *mut TimeManager;
[INFO] [stdout]    |                                        +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/consts.rs:75:17
[INFO] [stdout]    |
[INFO] [stdout] 75 |     unsafe { &*(&TIMER as *const DummyTimeManager as *const TimeManager) }
[INFO] [stdout]    |                 ^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 75 |     unsafe { &*(&raw const TIMER as *const DummyTimeManager as *const TimeManager) }
[INFO] [stdout]    |                  +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/consts.rs:81:17
[INFO] [stdout]    |
[INFO] [stdout] 81 |     unsafe { &*(&TT_TABLE as *const DummyTranspositionTable as *const TranspositionTable) }
[INFO] [stdout]    |                 ^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 81 |     unsafe { &*(&raw const TT_TABLE as *const DummyTranspositionTable as *const TranspositionTable) }
[INFO] [stdout]    |                  +++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `SQ` does not permit being left uninitialized
[INFO] [stdout]   --> src/movepick/mod.rs:70:36
[INFO] [stdout]    |
[INFO] [stdout] 70 |             recapture_sq: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]    |                                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |                                    |
[INFO] [stdout]    |                                    this code causes undefined behavior when executed
[INFO] [stdout]    |                                    help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout]    = note: integers must be initialized
[INFO] [stdout]    = note: `#[warn(invalid_value)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `i32` does not permit being left uninitialized
[INFO] [stdout]   --> src/movepick/mod.rs:71:33
[INFO] [stdout]    |
[INFO] [stdout] 71 |             threshold: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]    |                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |                                 |
[INFO] [stdout]    |                                 this code causes undefined behavior when executed
[INFO] [stdout]    |                                 help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout]    = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `[BitMove; 2]` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:101:31
[INFO] [stdout]     |
[INFO] [stdout] 101 |             killers: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                               |
[INFO] [stdout]     |                               this code causes undefined behavior when executed
[INFO] [stdout]     |                               help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `BitMove` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:102:26
[INFO] [stdout]     |
[INFO] [stdout] 102 |             cm: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          this code causes undefined behavior when executed
[INFO] [stdout]     |                          help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `SQ` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:103:36
[INFO] [stdout]     |
[INFO] [stdout] 103 |             recapture_sq: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    this code causes undefined behavior when executed
[INFO] [stdout]     |                                    help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `i32` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:104:33
[INFO] [stdout]     |
[INFO] [stdout] 104 |             threshold: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                 |
[INFO] [stdout]     |                                 this code causes undefined behavior when executed
[INFO] [stdout]     |                                 help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `*const [*const continuation::PieceToHistory; 4]` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:107:33
[INFO] [stdout]     |
[INFO] [stdout] 107 |             cont_hist: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                 |
[INFO] [stdout]     |                                 this code causes undefined behavior when executed
[INFO] [stdout]     |                                 help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `i16` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:155:29
[INFO] [stdout]     |
[INFO] [stdout] 155 |             depth: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                             |
[INFO] [stdout]     |                             this code causes undefined behavior when executed
[INFO] [stdout]     |                             help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `[BitMove; 2]` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:157:31
[INFO] [stdout]     |
[INFO] [stdout] 157 |             killers: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                               |
[INFO] [stdout]     |                               this code causes undefined behavior when executed
[INFO] [stdout]     |                               help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `BitMove` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:158:26
[INFO] [stdout]     |
[INFO] [stdout] 158 |             cm: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          this code causes undefined behavior when executed
[INFO] [stdout]     |                          help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `SQ` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:159:36
[INFO] [stdout]     |
[INFO] [stdout] 159 |             recapture_sq: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    this code causes undefined behavior when executed
[INFO] [stdout]     |                                    help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `*const butterfly::ButterflyHistory` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:161:33
[INFO] [stdout]     |
[INFO] [stdout] 161 |             main_hist: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                 |
[INFO] [stdout]     |                                 this code causes undefined behavior when executed
[INFO] [stdout]     |                                 help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `*const capture_piece_history::CapturePieceToHistory` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:162:36
[INFO] [stdout]     |
[INFO] [stdout] 162 |             capture_hist: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    this code causes undefined behavior when executed
[INFO] [stdout]     |                                    help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `*const [*const continuation::PieceToHistory; 4]` does not permit being left uninitialized
[INFO] [stdout]    --> src/movepick/mod.rs:163:33
[INFO] [stdout]     |
[INFO] [stdout] 163 |             cont_hist: unsafe { mem::MaybeUninit::uninit().assume_init() },
[INFO] [stdout]     |                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                 |
[INFO] [stdout]     |                                 this code causes undefined behavior when executed
[INFO] [stdout]     |                                 help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: raw pointers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `RootMove` does not permit being left uninitialized
[INFO] [stdout]   --> src/root_moves/root_moves_list.rs:35:25
[INFO] [stdout]    |
[INFO] [stdout] 35 |                 moves: [mem::MaybeUninit::uninit().assume_init(); MAX_MOVES],
[INFO] [stdout]    |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |                         |
[INFO] [stdout]    |                         this code causes undefined behavior when executed
[INFO] [stdout]    |                         help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]    |
[INFO] [stdout] note: integers must be initialized (in this struct field)
[INFO] [stdout]   --> src/root_moves/mod.rs:17:5
[INFO] [stdout]    |
[INFO] [stdout] 17 |     pub score: i32,
[INFO] [stdout]    |     ^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/search/mod.rs:789:32
[INFO] [stdout]     |
[INFO] [stdout] 789 | ...                   && (*cont_hists[0])[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                          ^^-------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                            |
[INFO] [stdout]     |                            this raw pointer has type `*const continuation::PieceToHistory`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&continuation::PieceToHistory`
[INFO] [stdout]    --> src/search/mod.rs:789:32
[INFO] [stdout]     |
[INFO] [stdout] 789 | ...                   && (*cont_hists[0])[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^
[INFO] [stdout]     = note: `#[deny(dangerous_implicit_autorefs)]` on by default
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 789 |                             && (&(*cont_hists[0]))[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                                ++                +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/search/mod.rs:790:32
[INFO] [stdout]     |
[INFO] [stdout] 790 | ...                   && (*cont_hists[1])[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                          ^^-------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                            |
[INFO] [stdout]     |                            this raw pointer has type `*const continuation::PieceToHistory`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&continuation::PieceToHistory`
[INFO] [stdout]    --> src/search/mod.rs:790:32
[INFO] [stdout]     |
[INFO] [stdout] 790 | ...                   && (*cont_hists[1])[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 790 |                             && (&(*cont_hists[1]))[(moved_piece, mov.get_dest())] < 0
[INFO] [stdout]     |                                ++                +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/search/mod.rs:880:31
[INFO] [stdout]     |
[INFO] [stdout] 880 | ...                   + (*cont_hists[0])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^-------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                           |
[INFO] [stdout]     |                           this raw pointer has type `*const continuation::PieceToHistory`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&continuation::PieceToHistory`
[INFO] [stdout]    --> src/search/mod.rs:880:31
[INFO] [stdout]     |
[INFO] [stdout] 880 | ...                   + (*cont_hists[0])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 880 |                             + (&(*cont_hists[0]))[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                               ++                +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/search/mod.rs:881:31
[INFO] [stdout]     |
[INFO] [stdout] 881 | ...                   + (*cont_hists[1])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^-------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                           |
[INFO] [stdout]     |                           this raw pointer has type `*const continuation::PieceToHistory`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&continuation::PieceToHistory`
[INFO] [stdout]    --> src/search/mod.rs:881:31
[INFO] [stdout]     |
[INFO] [stdout] 881 | ...                   + (*cont_hists[1])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 881 |                             + (&(*cont_hists[1]))[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                               ++                +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/search/mod.rs:882:31
[INFO] [stdout]     |
[INFO] [stdout] 882 | ...                   + (*cont_hists[3])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^-------------^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                           |
[INFO] [stdout]     |                           this raw pointer has type `*const continuation::PieceToHistory`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&continuation::PieceToHistory`
[INFO] [stdout]    --> src/search/mod.rs:882:31
[INFO] [stdout]     |
[INFO] [stdout] 882 | ...                   + (*cont_hists[3])[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 882 |                             + (&(*cont_hists[3]))[(moved_piece, mov.get_dest())] as i32
[INFO] [stdout]     |                               ++                +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the type `BitBoard` does not permit being left uninitialized
[INFO] [stdout]    --> src/search/eval.rs:743:54
[INFO] [stdout]     |
[INFO] [stdout] 743 |                 let mut pinners: BitBoard = unsafe { mem::MaybeUninit::uninit().assume_init() };
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |                                                      |
[INFO] [stdout]     |                                                      this code causes undefined behavior when executed
[INFO] [stdout]     |                                                      help: use `MaybeUninit<T>` instead, and only call `assume_init` after initialization is done
[INFO] [stdout]     |
[INFO] [stdout]     = note: integers must be initialized
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/threadpool/mod.rs:49:60
[INFO] [stdout]    |
[INFO] [stdout] 49 |                 let pool: *mut ThreadPool = mem::transmute(&mut THREADPOOL);
[INFO] [stdout]    |                                                            ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 49 |                 let pool: *mut ThreadPool = mem::transmute(&raw mut THREADPOOL);
[INFO] [stdout]    |                                                             +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/threadpool/mod.rs:60:78
[INFO] [stdout]    |
[INFO] [stdout] 60 |     unsafe { mem::transmute::<&mut DummyThreadPool, &'static mut ThreadPool>(&mut THREADPOOL) }
[INFO] [stdout]    |                                                                              ^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 60 |     unsafe { mem::transmute::<&mut DummyThreadPool, &'static mut ThreadPool>(&raw mut THREADPOOL) }
[INFO] [stdout]    |                                                                               +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `tanton_engine` (lib) due to 5 previous errors; 24 warnings emitted
[INFO] running `Command { std: "docker" "inspect" "8d1ca3421b4ba6f758c8b98e15b46fe5d6f6c6492e11936101017f3b819d5d82", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8d1ca3421b4ba6f758c8b98e15b46fe5d6f6c6492e11936101017f3b819d5d82", kill_on_drop: false }`
[INFO] [stdout] 8d1ca3421b4ba6f758c8b98e15b46fe5d6f6c6492e11936101017f3b819d5d82
