[INFO] cloning repository https://github.com/pingooio/stdx-rs
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/pingooio/stdx-rs" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] d74795e405a0ad98cc7f7f2cbfb7dae242b94f9e
[INFO] checking pingooio/stdx-rs/d74795e405a0ad98cc7f7f2cbfb7dae242b94f9e against master#642c19bfc3a5c1de985bf5d0cc8207ac9d22708a for pr-148577
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fpingooio%2Fstdx-rs" "/workspace/builds/worker-2-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-2-tc1/source'...
[INFO] [stderr] done.
[INFO] removed /workspace/builds/worker-2-tc1/source/.cargo/config.toml
[INFO] started tweaking git repo https://github.com/pingooio/stdx-rs
[INFO] finished tweaking git repo https://github.com/pingooio/stdx-rs
[INFO] tweaked toml for git repo https://github.com/pingooio/stdx-rs written to /workspace/builds/worker-2-tc1/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/pingooio/stdx-rs on toolchain 642c19bfc3a5c1de985bf5d0cc8207ac9d22708a
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/pingooio/stdx-rs already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr] warning: profiles for the non root package will be ignored, specify profiles at the workspace root:
[INFO] [stderr] package:   /workspace/builds/worker-2-tc1/source/bel/benchmarks/Cargo.toml
[INFO] [stderr] workspace: /workspace/builds/worker-2-tc1/source/Cargo.toml
[INFO] [stderr] warning: /workspace/builds/worker-2-tc1/source/bel/Cargo.toml: unused manifest key: dependencies.paste.ref
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]     Updating git repository `https://github.com/dtolnay/paste`
[INFO] [stderr]     Updating git repository `https://github.com/RustCrypto/hashes`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded compression-core v0.4.30
[INFO] [stderr]   Downloaded crypto-common v0.2.0-rc.5
[INFO] [stderr]   Downloaded is-terminal v0.4.17
[INFO] [stderr]   Downloaded compression-codecs v0.4.32
[INFO] [stderr]   Downloaded murmur3 v0.4.1
[INFO] [stderr]   Downloaded block-buffer v0.11.0
[INFO] [stderr]   Downloaded keccak v0.2.0-pre.0
[INFO] [stderr]   Downloaded async-compression v0.4.33
[INFO] [stderr]   Downloaded better_any v0.2.0
[INFO] [stderr]   Downloaded hybrid-array v0.4.5
[INFO] [stderr]   Downloaded const-oid v0.10.1
[INFO] [stderr]   Downloaded digest v0.11.0-rc.4
[INFO] [stderr]   Downloaded libfuzzer-sys v0.4.10
[INFO] [stderr]   Downloaded antlr4rust v0.3.0-beta3
[INFO] [stderr]   Downloaded aws-lc-rs v1.14.1
[INFO] [stderr]   Downloaded bindgen v0.72.1
[INFO] [stderr]   Downloaded aws-lc-sys v0.32.3
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9
[INFO] running `Command { std: "docker" "start" "-a" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9", kill_on_drop: false }`
[INFO] [stdout] 3ee4b3d2fc9f7c29032d6f98097422b3baa785ab3dc05edf4b8ec4ceaf30f4c9
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+642c19bfc3a5c1de985bf5d0cc8207ac9d22708a" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662
[INFO] running `Command { std: "docker" "start" "-a" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }`
[INFO] [stderr] warning: profiles for the non root package will be ignored, specify profiles at the workspace root:
[INFO] [stderr] package:   /opt/rustwide/workdir/bel/benchmarks/Cargo.toml
[INFO] [stderr] workspace: /opt/rustwide/workdir/Cargo.toml
[INFO] [stderr] warning: /opt/rustwide/workdir/bel/Cargo.toml: unused manifest key: dependencies.paste.ref
[INFO] [stderr]    Compiling quote v1.0.42
[INFO] [stderr]    Compiling unicode-ident v1.0.22
[INFO] [stderr]     Checking cfg-if v1.0.0 (/opt/rustwide/workdir/cfg-if)
[INFO] [stderr]    Compiling serde v1.0.228
[INFO] [stderr]    Compiling zerocopy v0.8.27
[INFO] [stderr]    Compiling ryu v1.0.18 (/opt/rustwide/workdir/ryu)
[INFO] [stderr]    Compiling parking_lot_core v0.9.12
[INFO] [stderr]     Checking itoa v1.0.11 (/opt/rustwide/workdir/itoa)
[INFO] [stderr]     Checking lock_api v0.4.14
[INFO] [stderr]     Checking pin-project-lite v0.2.14 (/opt/rustwide/workdir/pin_project_lite)
[INFO] [stderr]    Compiling libc v0.2.177
[INFO] [stderr]     Checking signal-hook-registry v1.4.6
[INFO] [stderr]    Compiling dunce v1.0.5
[INFO] [stderr]    Compiling fs_extra v1.3.0
[INFO] [stderr]     Checking getrandom v0.2.16
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]    Compiling thiserror v2.0.17
[INFO] [stderr]    Compiling aws-lc-rs v1.14.1
[INFO] [stderr]    Compiling proc-macro2 v1.0.103
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]  --> itoa/src/udiv128.rs:3:12
[INFO] [stdout]   |
[INFO] [stdout] 3 | #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]   |            ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]   |
[INFO] [stdout]   = note: no expected values for `feature`
[INFO] [stdout]   = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]   = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> itoa/src/udiv128.rs:30:12
[INFO] [stdout]    |
[INFO] [stdout] 30 | #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]    |
[INFO] [stdout]    = note: no expected values for `feature`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> itoa/src/lib.rs:88:16
[INFO] [stdout]    |
[INFO] [stdout] 88 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]    |
[INFO] [stdout]    = note: no expected values for `feature`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> itoa/src/lib.rs:98:16
[INFO] [stdout]    |
[INFO] [stdout] 98 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]    |
[INFO] [stdout]    = note: no expected values for `feature`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> itoa/src/lib.rs:137:24
[INFO] [stdout]     |
[INFO] [stdout] 137 |               #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout] ...
[INFO] [stdout] 218 | / impl_Integer!(
[INFO] [stdout] 219 | |     I8_MAX_LEN => i8,
[INFO] [stdout] 220 | |     U8_MAX_LEN => u8,
[INFO] [stdout] 221 | |     I16_MAX_LEN => i16,
[INFO] [stdout] ...   |
[INFO] [stdout] 224 | |     U32_MAX_LEN => u32
[INFO] [stdout] 225 | |     as u32);
[INFO] [stdout]     | |___________- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> itoa/src/lib.rs:137:24
[INFO] [stdout]     |
[INFO] [stdout] 137 |             #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout] ...
[INFO] [stdout] 227 | impl_Integer!(I64_MAX_LEN => i64, U64_MAX_LEN => u64 as u64);
[INFO] [stdout]     | ------------------------------------------------------------ in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> itoa/src/lib.rs:137:24
[INFO] [stdout]     |
[INFO] [stdout] 137 |             #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout] ...
[INFO] [stdout] 236 | impl_Integer!(I64_MAX_LEN => isize, U64_MAX_LEN => usize as u64);
[INFO] [stdout]     | ---------------------------------------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: this warning originates in the macro `impl_Integer` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> itoa/src/lib.rs:247:24
[INFO] [stdout]     |
[INFO] [stdout] 247 |             #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]     |                        ^^^^^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout] ...
[INFO] [stdout] 312 | impl_Integer128!(I128_MAX_LEN => i128, U128_MAX_LEN => u128);
[INFO] [stdout]     | ------------------------------------------------------------ in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: this warning originates in the macro `impl_Integer128` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking percent-encoding v2.3.2 (/opt/rustwide/workdir/percent_encoding)
[INFO] [stderr]     Checking iana-time-zone v0.1.64
[INFO] [stderr]     Checking rand_core v0.6.4
[INFO] [stderr]     Checking http v1.3.1
[INFO] [stderr]     Checking nom v7.1.3
[INFO] [stderr]     Checking httpdate v1.0.3 (/opt/rustwide/workdir/httpdate)
[INFO] [stderr]     Checking regex-automata v0.4.13
[INFO] [stderr]     Checking form_urlencoded v1.2.2 (/opt/rustwide/workdir/form_urlencoded)
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/buffer/mod.rs:29:16
[INFO] [stdout]    |
[INFO] [stdout] 29 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]    = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/buffer/mod.rs:48:16
[INFO] [stdout]    |
[INFO] [stdout] 48 |     #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/buffer/mod.rs:49:16
[INFO] [stdout]    |
[INFO] [stdout] 49 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/buffer/mod.rs:74:16
[INFO] [stdout]    |
[INFO] [stdout] 74 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/buffer/mod.rs:97:16
[INFO] [stdout]    |
[INFO] [stdout] 97 |     #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> ryu/src/buffer/mod.rs:127:16
[INFO] [stdout]     |
[INFO] [stdout] 127 |     #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `small`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> ryu/src/buffer/mod.rs:156:16
[INFO] [stdout]     |
[INFO] [stdout] 156 |     #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]     |                ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `small`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:23:12
[INFO] [stdout]    |
[INFO] [stdout] 23 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:51:12
[INFO] [stdout]    |
[INFO] [stdout] 51 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:63:12
[INFO] [stdout]    |
[INFO] [stdout] 63 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:73:12
[INFO] [stdout]    |
[INFO] [stdout] 73 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:80:12
[INFO] [stdout]    |
[INFO] [stdout] 80 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/common.rs:89:12
[INFO] [stdout]    |
[INFO] [stdout] 89 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s.rs:38:12
[INFO] [stdout]    |
[INFO] [stdout] 38 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s.rs:91:12
[INFO] [stdout]    |
[INFO] [stdout] 91 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:23:12
[INFO] [stdout]    |
[INFO] [stdout] 23 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:28:12
[INFO] [stdout]    |
[INFO] [stdout] 28 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:38:12
[INFO] [stdout]    |
[INFO] [stdout] 38 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:55:12
[INFO] [stdout]    |
[INFO] [stdout] 55 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:62:12
[INFO] [stdout]    |
[INFO] [stdout] 62 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:70:12
[INFO] [stdout]    |
[INFO] [stdout] 70 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/d2s_intrinsics.rs:77:12
[INFO] [stdout]    |
[INFO] [stdout] 77 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s.rs:39:12
[INFO] [stdout]    |
[INFO] [stdout] 39 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:26:12
[INFO] [stdout]    |
[INFO] [stdout] 26 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:43:12
[INFO] [stdout]    |
[INFO] [stdout] 43 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:49:12
[INFO] [stdout]    |
[INFO] [stdout] 49 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:57:12
[INFO] [stdout]    |
[INFO] [stdout] 57 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:74:12
[INFO] [stdout]    |
[INFO] [stdout] 74 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/f2s_intrinsics.rs:94:12
[INFO] [stdout]    |
[INFO] [stdout] 94 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]  --> ryu/src/pretty/exponent.rs:5:12
[INFO] [stdout]   |
[INFO] [stdout] 5 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]   |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `small`
[INFO] [stdout]   = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/pretty/exponent.rs:33:12
[INFO] [stdout]    |
[INFO] [stdout] 33 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]  --> ryu/src/pretty/mantissa.rs:5:12
[INFO] [stdout]   |
[INFO] [stdout] 5 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]   |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `small`
[INFO] [stdout]   = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/pretty/mantissa.rs:30:12
[INFO] [stdout]    |
[INFO] [stdout] 30 | #[cfg_attr(feature = "no-panic", inline)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]   --> ryu/src/pretty/mod.rs:57:12
[INFO] [stdout]    |
[INFO] [stdout] 57 | #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `small`
[INFO] [stdout]    = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]    --> ryu/src/pretty/mod.rs:162:12
[INFO] [stdout]     |
[INFO] [stdout] 162 | #[cfg_attr(feature = "no-panic", no_panic)]
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `small`
[INFO] [stdout]     = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]  --> ryu/src/buffer/mod.rs:3:7
[INFO] [stdout]   |
[INFO] [stdout] 3 | #[cfg(feature = "no-panic")]
[INFO] [stdout]   |       ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `small`
[INFO] [stdout]   = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `no-panic`
[INFO] [stdout]  --> ryu/src/pretty/mod.rs:6:7
[INFO] [stdout]   |
[INFO] [stdout] 6 | #[cfg(feature = "no-panic")]
[INFO] [stdout]   |       ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `small`
[INFO] [stdout]   = help: consider adding `no-panic` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling paste v1.0.15 (https://github.com/dtolnay/paste#6a302522)
[INFO] [stdout] warning: value assigned to `vp` is never read
[INFO] [stdout]    --> ryu/src/f2s.rs:145:17
[INFO] [stdout]     |
[INFO] [stdout] 145 |                 vp /= 10;
[INFO] [stdout]     |                 ^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking bit-vec v0.8.0
[INFO] [stderr]     Checking serde_json v1.0.145
[INFO] [stderr]     Checking better_any v0.2.0
[INFO] [stderr]     Checking murmur3 v0.4.1
[INFO] [stderr]    Compiling thiserror v1.0.61 (/opt/rustwide/workdir/thiserror)
[INFO] [stderr]     Checking num_cpus v1.16.0 (/opt/rustwide/workdir/num_cpus)
[INFO] [stderr]    Compiling typenum v1.19.0
[INFO] [stderr]    Compiling mime_guess v2.0.4 (/opt/rustwide/workdir/mime_guess)
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]  --> mime_guess/build.rs:1:7
[INFO] [stdout]   |
[INFO] [stdout] 1 | #[cfg(feature = "phf")]
[INFO] [stdout]   |       ^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]   = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]   = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/build.rs:20:7
[INFO] [stdout]    |
[INFO] [stdout] 20 | #[cfg(feature = "phf")]
[INFO] [stdout]    |       ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/build.rs:38:7
[INFO] [stdout]    |
[INFO] [stdout] 38 | #[cfg(feature = "phf")]
[INFO] [stdout]    |       ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/build.rs:72:11
[INFO] [stdout]    |
[INFO] [stdout] 72 | #[cfg(all(feature = "phf", feature = "rev-mappings"))]
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]    --> mime_guess/build.rs:120:15
[INFO] [stdout]     |
[INFO] [stdout] 120 | #[cfg(all(not(feature = "phf"), feature = "rev-mappings"))]
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]     = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/build.rs:30:11
[INFO] [stdout]    |
[INFO] [stdout] 30 |     #[cfg(feature = "phf")]
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `nacl`
[INFO] [stdout]    --> num_cpus/src/lib.rs:353:5
[INFO] [stdout]     |
[INFO] [stdout] 353 |     target_os = "nacl",
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `target_os` are: `aix`, `amdhsa`, `android`, `cuda`, `cygwin`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `helenos`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `lynxos178`, `macos`, `managarm`, `motor`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `psx`, `redox`, `rtems`, `solaris`, `solid_asp3`, and `teeos` and 13 more
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking parking_lot v0.12.5
[INFO] [stdout] warning: unexpected `cfg` condition value: `nacl`
[INFO] [stdout]    --> num_cpus/src/lib.rs:427:5
[INFO] [stdout]     |
[INFO] [stdout] 427 |     target_os = "nacl",
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `target_os` are: `aix`, `amdhsa`, `android`, `cuda`, `cygwin`, `dragonfly`, `emscripten`, `espidf`, `freebsd`, `fuchsia`, `haiku`, `helenos`, `hermit`, `horizon`, `hurd`, `illumos`, `ios`, `l4re`, `linux`, `lynxos178`, `macos`, `managarm`, `motor`, `netbsd`, `none`, `nto`, `nuttx`, `openbsd`, `psp`, `psx`, `redox`, `rtems`, `solaris`, `solid_asp3`, and `teeos` and 13 more
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling rustls v0.23.35
[INFO] [stderr]     Checking simd-adler32 v0.3.7
[INFO] [stderr]     Checking bit-set v0.8.0
[INFO] [stderr]     Checking crc32fast v1.4.2 (/opt/rustwide/workdir/crc32fast)
[INFO] [stderr]     Checking compression-core v0.4.30
[INFO] [stderr]     Checking base64 v0.22.100 (/opt/rustwide/workdir/base64)
[INFO] [stderr]    Compiling syn v2.0.110
[INFO] [stderr]     Checking miniz_oxide v0.8.9
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]   --> crc32fast/src/specialized/pclmulqdq.rs:85:17
[INFO] [stdout]    |
[INFO] [stdout] 85 |           let x = A {
[INFO] [stdout]    |  _________________^
[INFO] [stdout] 86 | |             a,
[INFO] [stdout] 87 | |         }
[INFO] [stdout] 88 | |         .b;
[INFO] [stdout]    | |__________^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> crc32fast/src/specialized/pclmulqdq.rs:79:1
[INFO] [stdout]    |
[INFO] [stdout] 79 | unsafe fn debug(s: &str, a: arch::__m128i) -> arch::__m128i {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:113:18
[INFO] [stdout]     |
[INFO] [stdout] 113 |     let mut x3 = get(&mut data);
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:104:1
[INFO] [stdout]     |
[INFO] [stdout] 104 | unsafe fn calculate(crc: u32, mut data: &[u8]) -> u32 {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:114:18
[INFO] [stdout]     |
[INFO] [stdout] 114 |     let mut x2 = get(&mut data);
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:115:18
[INFO] [stdout]     |
[INFO] [stdout] 115 |     let mut x1 = get(&mut data);
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:116:18
[INFO] [stdout]     |
[INFO] [stdout] 116 |     let mut x0 = get(&mut data);
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:123:14
[INFO] [stdout]     |
[INFO] [stdout] 123 |         x3 = reduce128(x3, get(&mut data), k1k2);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:123:28
[INFO] [stdout]     |
[INFO] [stdout] 123 |         x3 = reduce128(x3, get(&mut data), k1k2);
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:124:14
[INFO] [stdout]     |
[INFO] [stdout] 124 |         x2 = reduce128(x2, get(&mut data), k1k2);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:124:28
[INFO] [stdout]     |
[INFO] [stdout] 124 |         x2 = reduce128(x2, get(&mut data), k1k2);
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:125:14
[INFO] [stdout]     |
[INFO] [stdout] 125 |         x1 = reduce128(x1, get(&mut data), k1k2);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:125:28
[INFO] [stdout]     |
[INFO] [stdout] 125 |         x1 = reduce128(x1, get(&mut data), k1k2);
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:126:14
[INFO] [stdout]     |
[INFO] [stdout] 126 |         x0 = reduce128(x0, get(&mut data), k1k2);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:126:28
[INFO] [stdout]     |
[INFO] [stdout] 126 |         x0 = reduce128(x0, get(&mut data), k1k2);
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:130:17
[INFO] [stdout]     |
[INFO] [stdout] 130 |     let mut x = reduce128(x3, x2, k3k4);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:131:9
[INFO] [stdout]     |
[INFO] [stdout] 131 |     x = reduce128(x, x1, k3k4);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:132:9
[INFO] [stdout]     |
[INFO] [stdout] 132 |     x = reduce128(x, x0, k3k4);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::reduce128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:136:13
[INFO] [stdout]     |
[INFO] [stdout] 136 |         x = reduce128(x, get(&mut data), k3k4);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::get` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:136:26
[INFO] [stdout]     |
[INFO] [stdout] 136 |         x = reduce128(x, get(&mut data), k3k4);
[INFO] [stdout]     |                          ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::debug` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:139:5
[INFO] [stdout]     |
[INFO] [stdout] 139 |     debug("128 > 64 init", x);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `specialized::pclmulqdq::debug` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     debug("128 > 64 xx", x);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_clmulepi64_si128` with `#[target_feature]` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:193:14
[INFO] [stdout]     |
[INFO] [stdout] 193 |     let t1 = arch::_mm_clmulepi64_si128(a, keys, 0x00);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]`
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = help: in order for the call to be safe, the context requires the following additional target feature: pclmulqdq
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:192:1
[INFO] [stdout]     |
[INFO] [stdout] 192 | unsafe fn reduce128(a: arch::__m128i, b: arch::__m128i, keys: arch::__m128i) -> arch::__m128i {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_clmulepi64_si128` with `#[target_feature]` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:194:14
[INFO] [stdout]     |
[INFO] [stdout] 194 |     let t2 = arch::_mm_clmulepi64_si128(a, keys, 0x11);
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]`
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = help: in order for the call to be safe, the context requires the following additional target feature: pclmulqdq
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_xor_si128` with `#[target_feature]` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:195:5
[INFO] [stdout]     |
[INFO] [stdout] 195 |     arch::_mm_xor_si128(arch::_mm_xor_si128(b, t1), t2)
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]`
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = help: in order for the call to be safe, the context requires the following additional target feature: sse2
[INFO] [stdout]     = note: the sse2 target feature being enabled in the build configuration does not remove the requirement to list it in `#[target_feature]`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to function `std::arch::x86_64::_mm_xor_si128` with `#[target_feature]` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:195:25
[INFO] [stdout]     |
[INFO] [stdout] 195 |     arch::_mm_xor_si128(arch::_mm_xor_si128(b, t1), t2)
[INFO] [stdout]     |                         ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to function with `#[target_feature]`
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = help: in order for the call to be safe, the context requires the following additional target feature: sse2
[INFO] [stdout]     = note: the sse2 target feature being enabled in the build configuration does not remove the requirement to list it in `#[target_feature]`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::arch::x86_64::_mm_loadu_si128` is unsafe and requires unsafe block
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:200:13
[INFO] [stdout]     |
[INFO] [stdout] 200 |     let r = arch::_mm_loadu_si128(a.as_ptr() as *const arch::__m128i);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> crc32fast/src/specialized/pclmulqdq.rs:198:1
[INFO] [stdout]     |
[INFO] [stdout] 198 | unsafe fn get(a: &mut &[u8]) -> arch::__m128i {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Checking webpki-roots v1.0.4
[INFO] [stderr]     Checking iri-string v0.7.9
[INFO] [stdout] warning: unexpected `cfg` condition value: `cargo-clippy`
[INFO] [stdout]    --> base64/src/base64.rs:223:13
[INFO] [stdout]     |
[INFO] [stdout] 223 | #![cfg_attr(feature = "cargo-clippy", allow(clippy::cast_lossless))]
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `alloc`, `default`, and `std`
[INFO] [stdout]     = help: consider adding `cargo-clippy` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking unsafe_libyaml v0.2.11 (/opt/rustwide/workdir/unsafe_libyaml)
[INFO] [stderr]     Checking encoding_rs v0.8.35
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]     |
[INFO] [stdout] 377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/api.rs:623:5
[INFO] [stdout]     |
[INFO] [stdout] 623 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]     |     ------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]     |
[INFO] [stdout] 378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/api.rs:623:5
[INFO] [stdout]     |
[INFO] [stdout] 623 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]     |     ------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]     |
[INFO] [stdout] 379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/api.rs:623:5
[INFO] [stdout]     |
[INFO] [stdout] 623 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]     |     ------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nodes` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1077:5
[INFO] [stdout]      |
[INFO] [stdout] 1077 |     STACK_DEL!(nodes);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nodes` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1077:5
[INFO] [stdout]      |
[INFO] [stdout] 1077 |     STACK_DEL!(nodes);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `nodes` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1077:5
[INFO] [stdout]      |
[INFO] [stdout] 1077 |     STACK_DEL!(nodes);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1084:5
[INFO] [stdout]      |
[INFO] [stdout] 1084 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]      |     ------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1084:5
[INFO] [stdout]      |
[INFO] [stdout] 1084 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]      |     ------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives_copy` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1084:5
[INFO] [stdout]      |
[INFO] [stdout] 1084 |     STACK_DEL!(tag_directives_copy);
[INFO] [stdout]      |     ------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1102:17
[INFO] [stdout]      |
[INFO] [stdout] 1102 |                 STACK_DEL!(node.data.sequence.items);
[INFO] [stdout]      |                 ------------------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1102:17
[INFO] [stdout]      |
[INFO] [stdout] 1102 |                 STACK_DEL!(node.data.sequence.items);
[INFO] [stdout]      |                 ------------------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1102:17
[INFO] [stdout]      |
[INFO] [stdout] 1102 |                 STACK_DEL!(node.data.sequence.items);
[INFO] [stdout]      |                 ------------------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1105:17
[INFO] [stdout]      |
[INFO] [stdout] 1105 |                 STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]      |                 ----------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1105:17
[INFO] [stdout]      |
[INFO] [stdout] 1105 |                 STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]      |                 ----------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1105:17
[INFO] [stdout]      |
[INFO] [stdout] 1105 |                 STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]      |                 ----------------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `items` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1269:5
[INFO] [stdout]      |
[INFO] [stdout] 1269 |     STACK_DEL!(items);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `items` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1269:5
[INFO] [stdout]      |
[INFO] [stdout] 1269 |     STACK_DEL!(items);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `items` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1269:5
[INFO] [stdout]      |
[INFO] [stdout] 1269 |     STACK_DEL!(items);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `pairs` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1324:5
[INFO] [stdout]      |
[INFO] [stdout] 1324 |     STACK_DEL!(pairs);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `pairs` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1324:5
[INFO] [stdout]      |
[INFO] [stdout] 1324 |     STACK_DEL!(pairs);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `pairs` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/api.rs:1324:5
[INFO] [stdout]      |
[INFO] [stdout] 1324 |     STACK_DEL!(pairs);
[INFO] [stdout]      |     ----------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]     |
[INFO] [stdout] 377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/dumper.rs:175:13
[INFO] [stdout]     |
[INFO] [stdout] 175 |             STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]     |             ----------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]     |
[INFO] [stdout] 378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/dumper.rs:175:13
[INFO] [stdout]     |
[INFO] [stdout] 175 |             STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]     |             ----------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `node` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]     |
[INFO] [stdout] 379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/dumper.rs:175:13
[INFO] [stdout]     |
[INFO] [stdout] 175 |             STACK_DEL!(node.data.mapping.pairs);
[INFO] [stdout]     |             ----------------------------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]     |
[INFO] [stdout] 377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:141:5
[INFO] [stdout]     |
[INFO] [stdout] 141 |     STACK_DEL!(ctx);
[INFO] [stdout]     |     --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]     |
[INFO] [stdout] 378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:141:5
[INFO] [stdout]     |
[INFO] [stdout] 141 |     STACK_DEL!(ctx);
[INFO] [stdout]     |     --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]     |
[INFO] [stdout] 379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:141:5
[INFO] [stdout]     |
[INFO] [stdout] 141 |     STACK_DEL!(ctx);
[INFO] [stdout]     |     --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]     |
[INFO] [stdout] 377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:138:9
[INFO] [stdout]     |
[INFO] [stdout] 138 |         STACK_DEL!(ctx);
[INFO] [stdout]     |         --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]     |
[INFO] [stdout] 378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:138:9
[INFO] [stdout]     |
[INFO] [stdout] 138 |         STACK_DEL!(ctx);
[INFO] [stdout]     |         --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `ctx` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]     |
[INFO] [stdout] 379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]    ::: unsafe_libyaml/src/loader.rs:138:9
[INFO] [stdout]     |
[INFO] [stdout] 138 |         STACK_DEL!(ctx);
[INFO] [stdout]     |         --------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]    --> unsafe_libyaml/src/parser.rs:256:17
[INFO] [stdout]     |
[INFO] [stdout] 256 |                 tag_directives.start = tag_directives.end;
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1124:25
[INFO] [stdout]      |
[INFO] [stdout] 1124 |                         STACK_DEL!(tag_directives);
[INFO] [stdout]      |                         -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1124:25
[INFO] [stdout]      |
[INFO] [stdout] 1124 |                         STACK_DEL!(tag_directives);
[INFO] [stdout]      |                         -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1124:25
[INFO] [stdout]      |
[INFO] [stdout] 1124 |                         STACK_DEL!(tag_directives);
[INFO] [stdout]      |                         -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1130:21
[INFO] [stdout]      |
[INFO] [stdout] 1130 |                     STACK_DEL!(tag_directives);
[INFO] [stdout]      |                     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1130:21
[INFO] [stdout]      |
[INFO] [stdout] 1130 |                     STACK_DEL!(tag_directives);
[INFO] [stdout]      |                     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1130:21
[INFO] [stdout]      |
[INFO] [stdout] 1130 |                     STACK_DEL!(tag_directives);
[INFO] [stdout]      |                     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:377:9
[INFO] [stdout]      |
[INFO] [stdout]  377 |         $stack.end = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1145:5
[INFO] [stdout]      |
[INFO] [stdout] 1145 |     STACK_DEL!(tag_directives);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:378:9
[INFO] [stdout]      |
[INFO] [stdout]  378 |         $stack.top = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1145:5
[INFO] [stdout]      |
[INFO] [stdout] 1145 |     STACK_DEL!(tag_directives);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `tag_directives` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:379:9
[INFO] [stdout]      |
[INFO] [stdout]  379 |         $stack.start = ptr::null_mut();
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/parser.rs:1145:5
[INFO] [stdout]      |
[INFO] [stdout] 1145 |     STACK_DEL!(tag_directives);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STACK_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling jobserver v0.1.34
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1028:5
[INFO] [stdout]      |
[INFO] [stdout] 1028 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1264:5
[INFO] [stdout]      |
[INFO] [stdout] 1264 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1432:5
[INFO] [stdout]      |
[INFO] [stdout] 1432 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1456:17
[INFO] [stdout]      |
[INFO] [stdout] 1456 |                 STRING_DEL!(string);
[INFO] [stdout]      |                 ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1850:5
[INFO] [stdout]      |
[INFO] [stdout] 1850 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1851:5
[INFO] [stdout]      |
[INFO] [stdout] 1851 |     STRING_DEL!(leading_break);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1836:49
[INFO] [stdout]      |
[INFO] [stdout] 1836 | ...                   STRING_DEL!(leading_break);
[INFO] [stdout]      |                       -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1852:5
[INFO] [stdout]      |
[INFO] [stdout] 1852 |     STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |     ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:1837:49
[INFO] [stdout]      |
[INFO] [stdout] 1837 | ...                   STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |                       ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> base64/src/chunked_encoder.rs:60:26
[INFO] [stdout]    |
[INFO] [stdout] 60 |     pub(crate) fn new(s: &mut String) -> StringSink {
[INFO] [stdout]    |                          ^^^^^^^^^^^     ^^^^^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                          |
[INFO] [stdout]    |                          the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout]    = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 60 |     pub(crate) fn new(s: &mut String) -> StringSink<'_> {
[INFO] [stdout]    |                                                    ++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling rayon-core v1.13.0
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2281:5
[INFO] [stdout]      |
[INFO] [stdout] 2281 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2282:5
[INFO] [stdout]      |
[INFO] [stdout] 2282 |     STRING_DEL!(leading_break);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2276:9
[INFO] [stdout]      |
[INFO] [stdout] 2276 |         STRING_DEL!(leading_break);
[INFO] [stdout]      |         -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2283:5
[INFO] [stdout]      |
[INFO] [stdout] 2283 |     STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |     ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2277:9
[INFO] [stdout]      |
[INFO] [stdout] 2277 |         STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |         ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `whitespaces` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2284:5
[INFO] [stdout]      |
[INFO] [stdout] 2284 |     STRING_DEL!(whitespaces);
[INFO] [stdout]      |     ------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `whitespaces` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2278:9
[INFO] [stdout]      |
[INFO] [stdout] 2278 |         STRING_DEL!(whitespaces);
[INFO] [stdout]      |         ------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/src/lib.rs:29:7
[INFO] [stdout]    |
[INFO] [stdout] 29 | #[cfg(feature = "phf")]
[INFO] [stdout]    |       ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]    = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `phf`
[INFO] [stdout]   --> mime_guess/src/lib.rs:33:11
[INFO] [stdout]    |
[INFO] [stdout] 33 | #[cfg(not(feature = "phf"))]
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `rev-mappings`
[INFO] [stdout]    = help: consider adding `phf` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `string` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2450:5
[INFO] [stdout]      |
[INFO] [stdout] 2450 |     STRING_DEL!(string);
[INFO] [stdout]      |     ------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2451:5
[INFO] [stdout]      |
[INFO] [stdout] 2451 |     STRING_DEL!(leading_break);
[INFO] [stdout]      |     -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `leading_break` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2445:9
[INFO] [stdout]      |
[INFO] [stdout] 2445 |         STRING_DEL!(leading_break);
[INFO] [stdout]      |         -------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2452:5
[INFO] [stdout]      |
[INFO] [stdout] 2452 |     STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |     ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `trailing_breaks` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2446:9
[INFO] [stdout]      |
[INFO] [stdout] 2446 |         STRING_DEL!(trailing_breaks);
[INFO] [stdout]      |         ---------------------------- in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `whitespaces` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2453:5
[INFO] [stdout]      |
[INFO] [stdout] 2453 |     STRING_DEL!(whitespaces);
[INFO] [stdout]      |     ------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `whitespaces` is never read
[INFO] [stdout]     --> unsafe_libyaml/src/macros.rs:50:9
[INFO] [stdout]      |
[INFO] [stdout]   50 |         $string.start = $string.pointer;
[INFO] [stdout]      |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]     ::: unsafe_libyaml/src/scanner.rs:2447:9
[INFO] [stdout]      |
[INFO] [stdout] 2447 |         STRING_DEL!(whitespaces);
[INFO] [stdout]      |         ------------------------ in this macro invocation
[INFO] [stdout]      |
[INFO] [stdout]      = help: maybe it is overwritten before being read?
[INFO] [stdout]      = note: this warning originates in the macro `STRING_DEL` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling same-file v1.0.6
[INFO] [stderr]     Checking http-body v1.0.1
[INFO] [stderr]     Checking http-body-util v0.1.3
[INFO] [stderr]    Compiling zeroize v1.8.2
[INFO] [stderr]     Checking const-oid v0.10.1
[INFO] [stderr]    Compiling untrusted v0.7.1
[INFO] [stderr]    Compiling walkdir v2.5.0
[INFO] [stderr]     Checking ciborium-io v0.2.2
[INFO] [stderr]     Checking clap_builder v4.5.51
[INFO] [stderr]     Checking flate2 v1.1.5
[INFO] [stderr]     Checking itertools v0.10.5
[INFO] [stderr]    Compiling anyerr v1.0.86 (/opt/rustwide/workdir/anyerr)
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/build.rs:10:11
[INFO] [stdout]    |
[INFO] [stdout] 10 | #[cfg(all(feature = "backtrace", not(feature = "std")))]
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]    = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling async-trait v0.1.80 (/opt/rustwide/workdir/async-trait)
[INFO] [stderr]     Checking hex v0.4.3 (/opt/rustwide/workdir/hex)
[INFO] [stderr]    Compiling cc v1.2.45
[INFO] [stderr]     Checking cast v0.3.0
[INFO] [stderr]     Checking keccak v0.2.0-pre.0
[INFO] [stderr]     Checking rayon v1.11.0
[INFO] [stderr]     Checking plotters v0.3.7
[INFO] [stderr]     Checking is-terminal v0.4.17
[INFO] [stderr]     Checking net v0.1.0 (/opt/rustwide/workdir/net)
[INFO] [stderr]     Checking oorandom v11.1.5
[INFO] [stderr]     Checking anes v0.1.6
[INFO] [stderr]     Checking getopts v0.2.21 (/opt/rustwide/workdir/getopts)
[INFO] [stderr]     Checking serde_bytes v0.11.19
[INFO] [stderr]     Checking constant_time_eq v0.3.0 (/opt/rustwide/workdir/constant_time_eq)
[INFO] [stderr]     Checking memmem v0.1.1 (/opt/rustwide/workdir/memmem)
[INFO] [stderr]     Checking hostname v0.3.1 (/opt/rustwide/workdir/hostname)
[INFO] [stdout] warning: lint `non_fmt_panic` has been renamed to `non_fmt_panics`
[INFO] [stdout]  --> hex/tests/version-number.rs:1:10
[INFO] [stdout]   |
[INFO] [stdout] 1 | #![allow(non_fmt_panic)]
[INFO] [stdout]   |          ^^^^^^^^^^^^^ help: use the new name: `non_fmt_panics`
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(renamed_and_removed_lints)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `state` is never read
[INFO] [stdout]    --> memmem/src/two_way.rs:264:13
[INFO] [stdout]     |
[INFO] [stdout] 264 |             state.position += self.needle.len();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout]     = note: `#[warn(unused_assignments)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: value assigned to `state` is never read
[INFO] [stdout]    --> memmem/src/two_way.rs:266:17
[INFO] [stdout]     |
[INFO] [stdout] 266 |                 state.memory = 0; // set to needle.len() - self.period for overlapping matches
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = help: maybe it is overwritten before being read?
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]  --> anyerr/src/backtrace.rs:4:31
[INFO] [stdout]   |
[INFO] [stdout] 4 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]   |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]   = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]   = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]  --> anyerr/src/backtrace.rs:7:30
[INFO] [stdout]   |
[INFO] [stdout] 7 | #[cfg(not(any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]   |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]   = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:17:31
[INFO] [stdout]    |
[INFO] [stdout] 17 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]    |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:24:26
[INFO] [stdout]    |
[INFO] [stdout] 24 | #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]    |                          ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:31:30
[INFO] [stdout]    |
[INFO] [stdout] 31 | #[cfg(not(any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]    |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:51:24
[INFO] [stdout]    |
[INFO] [stdout] 51 |     any(std_backtrace, feature = "backtrace")
[INFO] [stdout]    |                        ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:59:52
[INFO] [stdout]    |
[INFO] [stdout] 59 | #[cfg(all(feature = "std", not(std_backtrace), not(feature = "backtrace")))]
[INFO] [stdout]    |                                                    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:66:31
[INFO] [stdout]    |
[INFO] [stdout] 66 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]    |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:703:64
[INFO] [stdout]     |
[INFO] [stdout] 703 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:824:64
[INFO] [stdout]     |
[INFO] [stdout] 824 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:360:30
[INFO] [stdout]     |
[INFO] [stdout] 360 |     #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:106:76
[INFO] [stdout]     |
[INFO] [stdout] 106 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:131:76
[INFO] [stdout]     |
[INFO] [stdout] 131 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:157:76
[INFO] [stdout]     |
[INFO] [stdout] 157 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:188:76
[INFO] [stdout]     |
[INFO] [stdout] 188 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:211:76
[INFO] [stdout]     |
[INFO] [stdout] 211 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:322:76
[INFO] [stdout]     |
[INFO] [stdout] 322 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:602:68
[INFO] [stdout]     |
[INFO] [stdout] 602 |     #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:891:30
[INFO] [stdout]     |
[INFO] [stdout] 891 |     #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/fmt.rs:42:34
[INFO] [stdout]    |
[INFO] [stdout] 42 |         #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]    |                                  ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11
[INFO] [stdout]    |
[INFO] [stdout] 46 |     while *end != 0 {
[INFO] [stdout]    |           ^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1
[INFO] [stdout]    |
[INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::add` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15
[INFO] [stdout]    |
[INFO] [stdout] 47 |         end = end.add(1);
[INFO] [stdout]    |               ^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::offset_from` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5
[INFO] [stdout]    |
[INFO] [stdout] 49 |     end.offset_from(s) as usize
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:49:8
[INFO] [stdout]    |
[INFO] [stdout] 49 |     if yaml_emitter_initialize(emitter).fail {
[INFO] [stdout]    |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:46:1
[INFO] [stdout]    |
[INFO] [stdout] 46 | pub(crate) unsafe fn unsafe_main(stdin: &mut dyn Read, mut stdout: &mut dyn Write) -> Result<(), Box<dyn Error>> {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_output` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:62:5
[INFO] [stdout]    |
[INFO] [stdout] 62 |     yaml_emitter_set_output(emitter, write_to_stdio, addr_of_mut!(stdout).cast());
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_canonical` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:63:5
[INFO] [stdout]    |
[INFO] [stdout] 63 |     yaml_emitter_set_canonical(emitter, false);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_set_unicode` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:64:5
[INFO] [stdout]    |
[INFO] [stdout] 64 |     yaml_emitter_set_unicode(emitter, false);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_stream_start_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:78:13
[INFO] [stdout]    |
[INFO] [stdout] 78 |             yaml_stream_start_event_initialize(event, YAML_UTF8_ENCODING)
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_stream_end_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:80:13
[INFO] [stdout]    |
[INFO] [stdout] 80 |             yaml_stream_end_event_initialize(event)
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_document_start_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:83:13
[INFO] [stdout]    |
[INFO] [stdout] 83 | /             yaml_document_start_event_initialize(
[INFO] [stdout] 84 | |                 event,
[INFO] [stdout] 85 | |                 ptr::null_mut::<yaml_version_directive_t>(),
[INFO] [stdout] 86 | |                 ptr::null_mut::<yaml_tag_directive_t>(),
[INFO] [stdout] 87 | |                 ptr::null_mut::<yaml_tag_directive_t>(),
[INFO] [stdout] 88 | |                 implicit,
[INFO] [stdout] 89 | |             )
[INFO] [stdout]    | |_____________^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_document_end_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:92:13
[INFO] [stdout]    |
[INFO] [stdout] 92 |             yaml_document_end_event_initialize(event, implicit)
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_mapping_start_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:94:13
[INFO] [stdout]     |
[INFO] [stdout]  94 | /             yaml_mapping_start_event_initialize(
[INFO] [stdout]  95 | |                 event,
[INFO] [stdout]  96 | |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout]  97 | |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout]  98 | |                 false,
[INFO] [stdout]  99 | |                 YAML_BLOCK_MAPPING_STYLE,
[INFO] [stdout] 100 | |             )
[INFO] [stdout]     | |_____________^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:96:17
[INFO] [stdout]    |
[INFO] [stdout] 96 |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:97:17
[INFO] [stdout]    |
[INFO] [stdout] 97 |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_mapping_end_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:102:13
[INFO] [stdout]     |
[INFO] [stdout] 102 |             yaml_mapping_end_event_initialize(event)
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_sequence_start_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:104:13
[INFO] [stdout]     |
[INFO] [stdout] 104 | /             yaml_sequence_start_event_initialize(
[INFO] [stdout] 105 | |                 event,
[INFO] [stdout] 106 | |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout] 107 | |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout] 108 | |                 false,
[INFO] [stdout] 109 | |                 YAML_BLOCK_SEQUENCE_STYLE,
[INFO] [stdout] 110 | |             )
[INFO] [stdout]     | |_____________^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:106:17
[INFO] [stdout]     |
[INFO] [stdout] 106 |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:107:17
[INFO] [stdout]     |
[INFO] [stdout] 107 |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_sequence_end_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:112:13
[INFO] [stdout]     |
[INFO] [stdout] 112 |             yaml_sequence_end_event_initialize(event)
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_value` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:116:13
[INFO] [stdout]     |
[INFO] [stdout] 116 |             get_value(line, value.as_mut_ptr(), &mut style);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:117:28
[INFO] [stdout]     |
[INFO] [stdout] 117 |             let implicit = get_tag(line, tag.as_mut_ptr()).is_null();
[INFO] [stdout]     |                            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_scalar_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:118:13
[INFO] [stdout]     |
[INFO] [stdout] 118 | /             yaml_scalar_event_initialize(
[INFO] [stdout] 119 | |                 event,
[INFO] [stdout] 120 | |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout] 121 | |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout] ...   |
[INFO] [stdout] 126 | |                 style,
[INFO] [stdout] 127 | |             )
[INFO] [stdout]     | |_____________^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:120:17
[INFO] [stdout]     |
[INFO] [stdout] 120 |                 get_anchor(b'&', line, anchor.as_mut_ptr()),
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_tag` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:121:17
[INFO] [stdout]     |
[INFO] [stdout] 121 |                 get_tag(line, tag.as_mut_ptr()),
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_alias_event_initialize` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:129:13
[INFO] [stdout]     |
[INFO] [stdout] 129 |             yaml_alias_event_initialize(event, get_anchor(b'*', line, anchor.as_mut_ptr()))
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `get_anchor` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:129:48
[INFO] [stdout]     |
[INFO] [stdout] 129 |             yaml_alias_event_initialize(event, get_anchor(b'*', line, anchor.as_mut_ptr()))
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:132:54
[INFO] [stdout]     |
[INFO] [stdout] 132 |             break Err(format!("Unknown event: '{}'", CStr::from_ptr(line)).into());
[INFO] [stdout]     |                                                      ^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_emit` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:138:12
[INFO] [stdout]     |
[INFO] [stdout] 138 |         if yaml_emitter_emit(emitter, event).fail {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:139:29
[INFO] [stdout]     |
[INFO] [stdout] 139 |             break Err(match (*emitter).error {
[INFO] [stdout]     |                             ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:66
[INFO] [stdout]     |
[INFO] [stdout] 141 |                 YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:81
[INFO] [stdout]     |
[INFO] [stdout] 141 |                 YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:68
[INFO] [stdout]     |
[INFO] [stdout] 142 |                 YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:83
[INFO] [stdout]     |
[INFO] [stdout] 142 |                 YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                                   ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_emitter_delete` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:149:5
[INFO] [stdout]     |
[INFO] [stdout] 149 |     yaml_emitter_delete(emitter);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]  --> anyerr/src/backtrace.rs:4:31
[INFO] [stdout]   |
[INFO] [stdout] 4 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]   |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]   = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]   = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]  --> anyerr/src/backtrace.rs:7:30
[INFO] [stdout]   |
[INFO] [stdout] 7 | #[cfg(not(any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]   |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]   = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]   = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:17:31
[INFO] [stdout]    |
[INFO] [stdout] 17 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]    |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:24:26
[INFO] [stdout]    |
[INFO] [stdout] 24 | #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]    |                          ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:31:30
[INFO] [stdout]    |
[INFO] [stdout] 31 | #[cfg(not(any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]    |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:51:24
[INFO] [stdout]    |
[INFO] [stdout] 51 |     any(std_backtrace, feature = "backtrace")
[INFO] [stdout]    |                        ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:59:52
[INFO] [stdout]    |
[INFO] [stdout] 59 | #[cfg(all(feature = "std", not(std_backtrace), not(feature = "backtrace")))]
[INFO] [stdout]    |                                                    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/backtrace.rs:66:31
[INFO] [stdout]    |
[INFO] [stdout] 66 | #[cfg(all(not(std_backtrace), feature = "backtrace"))]
[INFO] [stdout]    |                               ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:55:21
[INFO] [stdout]    |
[INFO] [stdout] 55 |         let bytes = slice::from_raw_parts(buffer.cast(), size as usize);
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:53:5
[INFO] [stdout]    |
[INFO] [stdout] 53 |     unsafe fn write_to_stdio(data: *mut c_void, buffer: *mut u8, size: u64) -> i32 {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:703:64
[INFO] [stdout]     |
[INFO] [stdout] 703 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:824:64
[INFO] [stdout]     |
[INFO] [stdout] 824 | #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:360:30
[INFO] [stdout]     |
[INFO] [stdout] 360 |     #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:106:76
[INFO] [stdout]     |
[INFO] [stdout] 106 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:131:76
[INFO] [stdout]     |
[INFO] [stdout] 131 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:157:76
[INFO] [stdout]     |
[INFO] [stdout] 157 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:188:76
[INFO] [stdout]     |
[INFO] [stdout] 188 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:211:76
[INFO] [stdout]     |
[INFO] [stdout] 211 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:322:76
[INFO] [stdout]     |
[INFO] [stdout] 322 |             #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:602:68
[INFO] [stdout]     |
[INFO] [stdout] 602 |     #[cfg(all(not(error_generic_member_access), any(std_backtrace, feature = "backtrace")))]
[INFO] [stdout]     |                                                                    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]    --> anyerr/src/error.rs:891:30
[INFO] [stdout]     |
[INFO] [stdout] 891 |     #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]     |                              ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]     = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `backtrace`
[INFO] [stdout]   --> anyerr/src/fmt.rs:42:34
[INFO] [stdout]    |
[INFO] [stdout] 42 |         #[cfg(any(std_backtrace, feature = "backtrace"))]
[INFO] [stdout]    |                                  ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: expected values for `feature` are: `default` and `std`
[INFO] [stdout]    = help: consider adding `backtrace` as a feature in `Cargo.toml`
[INFO] [stdout]    = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:56:15
[INFO] [stdout]    |
[INFO] [stdout] 56 |         match (*stdout).write(bytes) {
[INFO] [stdout]    |               ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:207:5
[INFO] [stdout]     |
[INFO] [stdout] 207 |     ptr::copy_nonoverlapping(line[start..end].as_ptr(), anchor, end - start);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:198:1
[INFO] [stdout]     |
[INFO] [stdout] 198 | unsafe fn get_anchor(sigil: u8, line: &[u8], anchor: *mut u8) -> *mut u8 {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:208:5
[INFO] [stdout]     |
[INFO] [stdout] 208 |     *anchor.add(end - start) = b'\0';
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::add` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:208:6
[INFO] [stdout]     |
[INFO] [stdout] 208 |     *anchor.add(end - start) = b'\0';
[INFO] [stdout]     |      ^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:221:5
[INFO] [stdout]     |
[INFO] [stdout] 221 |     ptr::copy_nonoverlapping(line[start..end].as_ptr(), tag, end - start);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:212:1
[INFO] [stdout]     |
[INFO] [stdout] 212 | unsafe fn get_tag(line: &[u8], tag: *mut u8) -> *mut u8 {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:222:5
[INFO] [stdout]     |
[INFO] [stdout] 222 |     *tag.add(end - start) = b'\0';
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::add` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:222:6
[INFO] [stdout]     |
[INFO] [stdout] 222 |     *tag.add(end - start) = b'\0';
[INFO] [stdout]     |      ^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::add` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:230:15
[INFO] [stdout]     |
[INFO] [stdout] 230 |     let end = line.add(line_len);
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:226:1
[INFO] [stdout]     |
[INFO] [stdout] 226 | unsafe fn get_value(line: &[u8], value: *mut i8, style: *mut yaml_scalar_style_t) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:231:17
[INFO] [stdout]     |
[INFO] [stdout] 231 |     let mut c = line.offset(4);
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:233:12
[INFO] [stdout]     |
[INFO] [stdout] 233 |         if *c as u8 == b' ' {
[INFO] [stdout]     |            ^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:234:21
[INFO] [stdout]     |
[INFO] [stdout] 234 |             start = c.offset(1);
[INFO] [stdout]     |                     ^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:235:13
[INFO] [stdout]     |
[INFO] [stdout] 235 |             *style = match *start as u8 {
[INFO] [stdout]     |             ^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:235:28
[INFO] [stdout]     |
[INFO] [stdout] 235 |             *style = match *start as u8 {
[INFO] [stdout]     |                            ^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:243:25
[INFO] [stdout]     |
[INFO] [stdout] 243 |                     c = c.offset(1);
[INFO] [stdout]     |                         ^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:247:21
[INFO] [stdout]     |
[INFO] [stdout] 247 |             start = start.offset(1);
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:250:13
[INFO] [stdout]     |
[INFO] [stdout] 250 |         c = c.offset(1);
[INFO] [stdout]     |             ^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:9
[INFO] [stdout]     |
[INFO] [stdout] 259 |         *value.offset(i) = if *c as u8 == b'\\' {
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:10
[INFO] [stdout]     |
[INFO] [stdout] 259 |         *value.offset(i) = if *c as u8 == b'\\' {
[INFO] [stdout]     |          ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:259:31
[INFO] [stdout]     |
[INFO] [stdout] 259 |         *value.offset(i) = if *c as u8 == b'\\' {
[INFO] [stdout]     |                               ^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:260:17
[INFO] [stdout]     |
[INFO] [stdout] 260 |             c = c.offset(1);
[INFO] [stdout]     |                 ^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:261:19
[INFO] [stdout]     |
[INFO] [stdout] 261 |             match *c as u8 {
[INFO] [stdout]     |                   ^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:271:13
[INFO] [stdout]     |
[INFO] [stdout] 271 |             *c
[INFO] [stdout]     |             ^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:274:13
[INFO] [stdout]     |
[INFO] [stdout] 274 |         c = c.offset(1);
[INFO] [stdout]     |             ^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:276:5
[INFO] [stdout]     |
[INFO] [stdout] 276 |     *value.offset(i) = b'\0' as i8;
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:276:6
[INFO] [stdout]     |
[INFO] [stdout] 276 |     *value.offset(i) = b'\0' as i8;
[INFO] [stdout]     |      ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:139:29
[INFO] [stdout]     |
[INFO] [stdout] 139 |             break Err(match (*emitter).error {
[INFO] [stdout]     |                             ^^-------^^^^^^^
[INFO] [stdout]     |                               |
[INFO] [stdout]     |                               this raw pointer has type `*mut yaml_emitter_t`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]     = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout]     = note: `#[deny(dangerous_implicit_autorefs)]` on by default
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 139 |             break Err(match (&(*emitter)).error {
[INFO] [stdout]     |                             ++          +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:141:81
[INFO] [stdout]     |
[INFO] [stdout] 141 |                 YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                                 ^^-------^^^^^^^^^
[INFO] [stdout]     |                                                                                   |
[INFO] [stdout]     |                                                                                   this raw pointer has type `*mut yaml_emitter_t`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]     = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 141 |                 YAML_WRITER_ERROR => format!("Writer error: {}", CStr::from_ptr((&(*emitter)).problem)).into(),
[INFO] [stdout]     |                                                                                 ++          +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-emitter-test-suite.rs:142:83
[INFO] [stdout]     |
[INFO] [stdout] 142 |                 YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((*emitter).problem)).into(),
[INFO] [stdout]     |                                                                                   ^^-------^^^^^^^^^
[INFO] [stdout]     |                                                                                     |
[INFO] [stdout]     |                                                                                     this raw pointer has type `*mut yaml_emitter_t`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]     = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 142 |                 YAML_EMITTER_ERROR => format!("Emitter error: {}", CStr::from_ptr((&(*emitter)).problem)).into(),
[INFO] [stdout]     |                                                                                   ++          +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-emitter-test-suite" test) due to 3 previous errors; 60 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11
[INFO] [stdout]    |
[INFO] [stdout] 46 |     while *end != 0 {
[INFO] [stdout]    |           ^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1
[INFO] [stdout]    |
[INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::add` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15
[INFO] [stdout]    |
[INFO] [stdout] 47 |         end = end.add(1);
[INFO] [stdout]    |               ^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::offset_from` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5
[INFO] [stdout]    |
[INFO] [stdout] 49 |     end.offset_from(s) as usize
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:44:8
[INFO] [stdout]    |
[INFO] [stdout] 44 |     if yaml_parser_initialize(parser).fail {
[INFO] [stdout]    |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:41:1
[INFO] [stdout]    |
[INFO] [stdout] 41 | pub(crate) unsafe fn unsafe_main(mut stdin: &mut dyn Read, stdout: &mut dyn Write) -> Result<(), Box<dyn Error>> {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_set_input` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:60:5
[INFO] [stdout]    |
[INFO] [stdout] 60 |     yaml_parser_set_input(parser, read_from_stdio, addr_of_mut!(stdin).cast());
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_parse` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:65:12
[INFO] [stdout]    |
[INFO] [stdout] 65 |         if yaml_parser_parse(parser, event).fail {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:56
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                                       ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((*parser).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((*parser).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:75:13
[INFO] [stdout]    |
[INFO] [stdout] 75 |             yaml_parser_delete(parser);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:79:40
[INFO] [stdout]    |
[INFO] [stdout] 79 |         let type_: yaml_event_type_t = (*event).type_;
[INFO] [stdout]    |                                        ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17
[INFO] [stdout]    |
[INFO] [stdout] 88 |             if !(*event).data.document_start.implicit {
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17
[INFO] [stdout]    |
[INFO] [stdout] 88 |             if !(*event).data.document_start.implicit {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17
[INFO] [stdout]    |
[INFO] [stdout] 94 |             if !(*event).data.document_end.implicit {
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17
[INFO] [stdout]    |
[INFO] [stdout] 94 |             if !(*event).data.document_end.implicit {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17
[INFO] [stdout]     |
[INFO] [stdout] 100 |             if !(*event).data.mapping_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17
[INFO] [stdout]     |
[INFO] [stdout] 100 |             if !(*event).data.mapping_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:48
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17
[INFO] [stdout]     |
[INFO] [stdout] 103 |             if !(*event).data.mapping_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17
[INFO] [stdout]     |
[INFO] [stdout] 103 |             if !(*event).data.mapping_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:49
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17
[INFO] [stdout]     |
[INFO] [stdout] 111 |             if !(*event).data.sequence_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17
[INFO] [stdout]     |
[INFO] [stdout] 111 |             if !(*event).data.sequence_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:48
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17
[INFO] [stdout]     |
[INFO] [stdout] 114 |             if !(*event).data.sequence_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17
[INFO] [stdout]     |
[INFO] [stdout] 114 |             if !(*event).data.sequence_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:49
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:46:11
[INFO] [stdout]    |
[INFO] [stdout] 46 |     while *end != 0 {
[INFO] [stdout]    |           ^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:44:1
[INFO] [stdout]    |
[INFO] [stdout] 44 | unsafe fn strlen(s: *const u8) -> usize {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17
[INFO] [stdout]     |
[INFO] [stdout] 122 |             if !(*event).data.scalar.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17
[INFO] [stdout]     |
[INFO] [stdout] 122 |             if !(*event).data.scalar.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:48
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |             if !(*event).data.scalar.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |             if !(*event).data.scalar.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:49
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44
[INFO] [stdout]     |
[INFO] [stdout] 128 |             let _ = stdout.write_all(match (*event).data.scalar.style {
[INFO] [stdout]     |                                            ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44
[INFO] [stdout]     |
[INFO] [stdout] 128 |             let _ = stdout.write_all(match (*event).data.scalar.style {
[INFO] [stdout]     |                                            ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `print_escaped` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:13
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                   ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                   ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:50
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                                 ^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_event_delete` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:144:9
[INFO] [stdout]     |
[INFO] [stdout] 144 |         yaml_event_delete(event);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:149:5
[INFO] [stdout]     |
[INFO] [stdout] 149 |     yaml_parser_delete(parser);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:50:21
[INFO] [stdout]    |
[INFO] [stdout] 50 |         let slice = slice::from_raw_parts_mut(buffer.cast(), size as usize);
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:48:5
[INFO] [stdout]    |
[INFO] [stdout] 48 |     unsafe fn read_from_stdio(data: *mut c_void, buffer: *mut u8, size: u64, size_read: *mut u64) -> i32 {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:51:15
[INFO] [stdout]    |
[INFO] [stdout] 51 |         match (*stdin).read(slice) {
[INFO] [stdout]    |               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:53:17
[INFO] [stdout]    |
[INFO] [stdout] 53 |                 *size_read = n as u64;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:154:15
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let end = str.offset(length as isize);
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:153:1
[INFO] [stdout]     |
[INFO] [stdout] 153 | unsafe fn print_escaped(stdout: &mut dyn Write, mut str: *mut u8, length: u64) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:156:27
[INFO] [stdout]     |
[INFO] [stdout] 156 |         let repr = match &*str {
[INFO] [stdout]     |                           ^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:166:15
[INFO] [stdout]     |
[INFO] [stdout] 166 |         str = str.offset(1);
[INFO] [stdout]     |               ^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::add` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:47:15
[INFO] [stdout]    |
[INFO] [stdout] 47 |         end = end.add(1);
[INFO] [stdout]    |               ^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::const_ptr::<impl *const T>::offset_from` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/cstr/mod.rs:49:5
[INFO] [stdout]    |
[INFO] [stdout] 49 |     end.offset_from(s) as usize
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_initialize` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:44:8
[INFO] [stdout]    |
[INFO] [stdout] 44 |     if yaml_parser_initialize(parser).fail {
[INFO] [stdout]    |        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:41:1
[INFO] [stdout]    |
[INFO] [stdout] 41 | pub(crate) unsafe fn unsafe_main(mut stdin: &mut dyn Read, stdout: &mut dyn Write) -> Result<(), Box<dyn Error>> {
[INFO] [stdout]    | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_set_input` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:60:5
[INFO] [stdout]    |
[INFO] [stdout] 60 |     yaml_parser_set_input(parser, read_from_stdio, addr_of_mut!(stdin).cast());
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_parse` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:65:12
[INFO] [stdout]    |
[INFO] [stdout] 65 |         if yaml_parser_parse(parser, event).fail {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:56
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                        ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                                       ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((*parser).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((*parser).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:75:13
[INFO] [stdout]    |
[INFO] [stdout] 75 |             yaml_parser_delete(parser);
[INFO] [stdout]    |             ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:79:40
[INFO] [stdout]    |
[INFO] [stdout] 79 |         let type_: yaml_event_type_t = (*event).type_;
[INFO] [stdout]    |                                        ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17
[INFO] [stdout]    |
[INFO] [stdout] 88 |             if !(*event).data.document_start.implicit {
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:88:17
[INFO] [stdout]    |
[INFO] [stdout] 88 |             if !(*event).data.document_start.implicit {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17
[INFO] [stdout]    |
[INFO] [stdout] 94 |             if !(*event).data.document_end.implicit {
[INFO] [stdout]    |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:94:17
[INFO] [stdout]    |
[INFO] [stdout] 94 |             if !(*event).data.document_end.implicit {
[INFO] [stdout]    |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17
[INFO] [stdout]     |
[INFO] [stdout] 100 |             if !(*event).data.mapping_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:100:17
[INFO] [stdout]     |
[INFO] [stdout] 100 |             if !(*event).data.mapping_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:48
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:101:63
[INFO] [stdout]     |
[INFO] [stdout] 101 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.mapping_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17
[INFO] [stdout]     |
[INFO] [stdout] 103 |             if !(*event).data.mapping_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:103:17
[INFO] [stdout]     |
[INFO] [stdout] 103 |             if !(*event).data.mapping_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:49
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:104:64
[INFO] [stdout]     |
[INFO] [stdout] 104 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.mapping_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17
[INFO] [stdout]     |
[INFO] [stdout] 111 |             if !(*event).data.sequence_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:111:17
[INFO] [stdout]     |
[INFO] [stdout] 111 |             if !(*event).data.sequence_start.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:48
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                                       ^^------^^^^^^^^^
[INFO] [stdout]    |                                                                         |
[INFO] [stdout]    |                                                                         this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout]    = note: `#[deny(dangerous_implicit_autorefs)]` on by default
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((&(*parser)).problem));
[INFO] [stdout]    |                                                                       ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                  |
[INFO] [stdout]    |                  this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (&(*parser)).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                                                      |
[INFO] [stdout]    |                                                      this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (&(*parser)).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((*parser).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                        |
[INFO] [stdout]    |                        this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((&(*parser)).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((*parser).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                        |
[INFO] [stdout]    |                        this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((&(*parser)).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:112:63
[INFO] [stdout]     |
[INFO] [stdout] 112 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.sequence_start.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17
[INFO] [stdout]     |
[INFO] [stdout] 114 |             if !(*event).data.sequence_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:114:17
[INFO] [stdout]     |
[INFO] [stdout] 114 |             if !(*event).data.sequence_start.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:49
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:115:64
[INFO] [stdout]     |
[INFO] [stdout] 115 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.sequence_start.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17
[INFO] [stdout]     |
[INFO] [stdout] 122 |             if !(*event).data.scalar.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:122:17
[INFO] [stdout]     |
[INFO] [stdout] 122 |             if !(*event).data.scalar.anchor.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:48
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:123:63
[INFO] [stdout]     |
[INFO] [stdout] 123 |                 let _ = write!(stdout, " &{}", CStr::from_ptr((*event).data.scalar.anchor as *const i8),);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |             if !(*event).data.scalar.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:125:17
[INFO] [stdout]     |
[INFO] [stdout] 125 |             if !(*event).data.scalar.tag.is_null() {
[INFO] [stdout]     |                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:49
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:126:64
[INFO] [stdout]     |
[INFO] [stdout] 126 |                 let _ = write!(stdout, " <{}>", CStr::from_ptr((*event).data.scalar.tag as *const i8),);
[INFO] [stdout]     |                                                                ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44
[INFO] [stdout]     |
[INFO] [stdout] 128 |             let _ = stdout.write_all(match (*event).data.scalar.style {
[INFO] [stdout]     |                                            ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:128:44
[INFO] [stdout]     |
[INFO] [stdout] 128 |             let _ = stdout.write_all(match (*event).data.scalar.style {
[INFO] [stdout]     |                                            ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `print_escaped` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:13
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                   ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:35
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                   ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                                               ^^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:136:63
[INFO] [stdout]     |
[INFO] [stdout] 136 |             print_escaped(stdout, (*event).data.scalar.value, (*event).data.scalar.length);
[INFO] [stdout]     |                                                               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `cstr::CStr::from_ptr` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:50
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: access to union field is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                                 ^^^^^^^^^^^^^^^^^^^ access to union field
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:139:65
[INFO] [stdout]     |
[INFO] [stdout] 139 |             let _ = writeln!(stdout, "=ALI *{}", CStr::from_ptr((*event).data.alias.anchor as *const i8),);
[INFO] [stdout]     |                                                                 ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_event_delete` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:144:9
[INFO] [stdout]     |
[INFO] [stdout] 144 |         yaml_event_delete(event);
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_libyaml::yaml_parser_delete` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:149:5
[INFO] [stdout]     |
[INFO] [stdout] 149 |     yaml_parser_delete(parser);
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::slice::from_raw_parts_mut` is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:50:21
[INFO] [stdout]    |
[INFO] [stdout] 50 |         let slice = slice::from_raw_parts_mut(buffer.cast(), size as usize);
[INFO] [stdout]    |                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:48:5
[INFO] [stdout]    |
[INFO] [stdout] 48 |     unsafe fn read_from_stdio(data: *mut c_void, buffer: *mut u8, size: u64, size_read: *mut u64) -> i32 {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:51:15
[INFO] [stdout]    |
[INFO] [stdout] 51 |         match (*stdin).read(slice) {
[INFO] [stdout]    |               ^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:53:17
[INFO] [stdout]    |
[INFO] [stdout] 53 |                 *size_read = n as u64;
[INFO] [stdout]    |                 ^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:154:15
[INFO] [stdout]     |
[INFO] [stdout] 154 |     let end = str.offset(length as isize);
[INFO] [stdout]     |               ^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:153:1
[INFO] [stdout]     |
[INFO] [stdout] 153 | unsafe fn print_escaped(stdout: &mut dyn Write, mut str: *mut u8, length: u64) {
[INFO] [stdout]     | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:156:27
[INFO] [stdout]     |
[INFO] [stdout] 156 |         let repr = match &*str {
[INFO] [stdout]     |                           ^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]    --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:166:15
[INFO] [stdout]     |
[INFO] [stdout] 166 |         str = str.offset(1);
[INFO] [stdout]     |               ^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:389:18
[INFO] [stdout]     |
[INFO] [stdout] 389 |     pub fn chain(&self) -> Chain {
[INFO] [stdout]     |                  ^^^^^     ^^^^^ the same lifetime is hidden here
[INFO] [stdout]     |                  |
[INFO] [stdout]     |                  the lifetime is elided here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout]     = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 389 |     pub fn chain(&self) -> Chain<'_> {
[INFO] [stdout]     |                                 ++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:864:14
[INFO] [stdout]     |
[INFO] [stdout] 864 |     fn erase(&self) -> Ref<ErrorImpl> {
[INFO] [stdout]     |              ^^^^^     ^^^^^^^^^^^^^^ the same lifetime is hidden here
[INFO] [stdout]     |              |
[INFO] [stdout]     |              the lifetime is elided here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 864 |     fn erase(&self) -> Ref<'_, ErrorImpl> {
[INFO] [stdout]     |                            +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:873:38
[INFO] [stdout]     |
[INFO] [stdout] 873 |     pub(crate) unsafe fn error(this: Ref<Self>) -> &(dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                      ^^^^^^^^^     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                      |
[INFO] [stdout]     |                                      the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 873 |     pub(crate) unsafe fn error(this: Ref<'_, Self>) -> &(dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                          +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-parser-test-suite" test) due to 5 previous errors; 66 warnings emitted
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:66:71
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((*parser).problem));
[INFO] [stdout]    |                                                                       ^^------^^^^^^^^^
[INFO] [stdout]    |                                                                         |
[INFO] [stdout]    |                                                                         this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout]    = note: `#[deny(dangerous_implicit_autorefs)]` on by default
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 66 |             let mut error = format!("Parse error: {}", CStr::from_ptr((&(*parser)).problem));
[INFO] [stdout]    |                                                                       ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:16
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                  |
[INFO] [stdout]    |                  this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (&(*parser)).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:67:52
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (*parser).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                                                      |
[INFO] [stdout]    |                                                      this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 67 |             if (*parser).problem_mark.line != 0 || (&(*parser)).problem_mark.column != 0 {
[INFO] [stdout]    |                                                    ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:880:42
[INFO] [stdout]     |
[INFO] [stdout] 880 |     pub(crate) unsafe fn error_mut(this: Mut<Self>) -> &mut (dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                          ^^^^^^^^^     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                          |
[INFO] [stdout]     |                                          the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 880 |     pub(crate) unsafe fn error_mut(this: Mut<'_, Self>) -> &mut (dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                              +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:71:22
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((*parser).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                        |
[INFO] [stdout]    |                        this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 71 |                     ((&(*parser)).problem_mark.line).wrapping_add(1_u64),
[INFO] [stdout]    |                      ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:892:42
[INFO] [stdout]     |
[INFO] [stdout] 892 |     pub(crate) unsafe fn backtrace(this: Ref<Self>) -> &Backtrace {
[INFO] [stdout]     |                                          ^^^^^^^^^     ^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                          |
[INFO] [stdout]     |                                          the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 892 |     pub(crate) unsafe fn backtrace(this: Ref<'_, Self>) -> &Backtrace {
[INFO] [stdout]     |                                              +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> anyerr/src/ptr.rs:47:19
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub fn by_ref(&self) -> Ref<T> {
[INFO] [stdout]    |                   ^^^^^     ^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                   |
[INFO] [stdout]    |                   the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub fn by_ref(&self) -> Ref<'_, T> {
[INFO] [stdout]    |                                 +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> anyerr/src/ptr.rs:54:19
[INFO] [stdout]    |
[INFO] [stdout] 54 |     pub fn by_mut(&mut self) -> Mut<T> {
[INFO] [stdout]    |                   ^^^^^^^^^     ^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                   |
[INFO] [stdout]    |                   the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 54 |     pub fn by_mut(&mut self) -> Mut<'_, T> {
[INFO] [stdout]    |                                     +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]   --> unsafe_libyaml/src/bin/run-parser-test-suite.rs:72:22
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((*parser).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ^^------^^^^^^^^^^^^^^
[INFO] [stdout]    |                        |
[INFO] [stdout]    |                        this raw pointer has type `*mut yaml_parser_t`
[INFO] [stdout]    |
[INFO] [stdout]    = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout]    = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]    |
[INFO] [stdout] 72 |                     ((&(*parser)).problem_mark.column).wrapping_add(1_u64),
[INFO] [stdout]    |                      ++         +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:389:18
[INFO] [stdout]     |
[INFO] [stdout] 389 |     pub fn chain(&self) -> Chain {
[INFO] [stdout]     |                  ^^^^^     ^^^^^ the same lifetime is hidden here
[INFO] [stdout]     |                  |
[INFO] [stdout]     |                  the lifetime is elided here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout]     = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 389 |     pub fn chain(&self) -> Chain<'_> {
[INFO] [stdout]     |                                 ++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:864:14
[INFO] [stdout]     |
[INFO] [stdout] 864 |     fn erase(&self) -> Ref<ErrorImpl> {
[INFO] [stdout]     |              ^^^^^     ^^^^^^^^^^^^^^ the same lifetime is hidden here
[INFO] [stdout]     |              |
[INFO] [stdout]     |              the lifetime is elided here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 864 |     fn erase(&self) -> Ref<'_, ErrorImpl> {
[INFO] [stdout]     |                            +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:873:38
[INFO] [stdout]     |
[INFO] [stdout] 873 |     pub(crate) unsafe fn error(this: Ref<Self>) -> &(dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                      ^^^^^^^^^     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                      |
[INFO] [stdout]     |                                      the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 873 |     pub(crate) unsafe fn error(this: Ref<'_, Self>) -> &(dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                          +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:880:42
[INFO] [stdout]     |
[INFO] [stdout] 880 |     pub(crate) unsafe fn error_mut(this: Mut<Self>) -> &mut (dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                          ^^^^^^^^^     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                          |
[INFO] [stdout]     |                                          the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 880 |     pub(crate) unsafe fn error_mut(this: Mut<'_, Self>) -> &mut (dyn StdError + Send + Sync + 'static) {
[INFO] [stdout]     |                                              +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]    --> anyerr/src/error.rs:892:42
[INFO] [stdout]     |
[INFO] [stdout] 892 |     pub(crate) unsafe fn backtrace(this: Ref<Self>) -> &Backtrace {
[INFO] [stdout]     |                                          ^^^^^^^^^     ^^^^^^^^^^ the same lifetime is elided here
[INFO] [stdout]     |                                          |
[INFO] [stdout]     |                                          the lifetime is hidden here
[INFO] [stdout]     |
[INFO] [stdout]     = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]     |
[INFO] [stdout] 892 |     pub(crate) unsafe fn backtrace(this: Ref<'_, Self>) -> &Backtrace {
[INFO] [stdout]     |                                              +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> anyerr/src/ptr.rs:47:19
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub fn by_ref(&self) -> Ref<T> {
[INFO] [stdout]    |                   ^^^^^     ^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                   |
[INFO] [stdout]    |                   the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub fn by_ref(&self) -> Ref<'_, T> {
[INFO] [stdout]    |                                 +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> anyerr/src/ptr.rs:54:19
[INFO] [stdout]    |
[INFO] [stdout] 54 |     pub fn by_mut(&mut self) -> Mut<T> {
[INFO] [stdout]    |                   ^^^^^^^^^     ^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                   |
[INFO] [stdout]    |                   the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 54 |     pub fn by_mut(&mut self) -> Mut<'_, T> {
[INFO] [stdout]    |                                     +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `unsafe_libyaml` (bin "run-parser-test-suite") due to 5 previous errors; 66 warnings emitted
[INFO] running `Command { std: "docker" "inspect" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662", kill_on_drop: false }`
[INFO] [stdout] d7b0030c8ca8fe60fe3db6ba6c7402ee24c445778c8b6ee719b47d2d1950b662
