[INFO] fetching crate lv-std 0.0.2...
[INFO] testing lv-std-0.0.2 against master#0d162b25edd5bf0dba9a22e83b614f1113e90474 for pr-150681
[INFO] extracting crate lv-std 0.0.2 into /workspace/builds/worker-6-tc1/source
[INFO] started tweaking crates.io crate lv-std 0.0.2
[INFO] finished tweaking crates.io crate lv-std 0.0.2
[INFO] tweaked toml for crates.io crate lv-std 0.0.2 written to /workspace/builds/worker-6-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate lv-std 0.0.2 on toolchain 0d162b25edd5bf0dba9a22e83b614f1113e90474
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate lv-std 0.0.2 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded generic-array v1.2.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 1672b80191f427c4824afb3178dd58b6e74efbb649e92e482c4137150801ebc9
[INFO] running `Command { std: "docker" "start" "-a" "1672b80191f427c4824afb3178dd58b6e74efbb649e92e482c4137150801ebc9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "1672b80191f427c4824afb3178dd58b6e74efbb649e92e482c4137150801ebc9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "1672b80191f427c4824afb3178dd58b6e74efbb649e92e482c4137150801ebc9", kill_on_drop: false }`
[INFO] [stdout] 1672b80191f427c4824afb3178dd58b6e74efbb649e92e482c4137150801ebc9
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 2a05501d0081e805da79f1450fa2b25d0e13d6aa87427c747a88d65b2b6d6989
[INFO] running `Command { std: "docker" "start" "-a" "2a05501d0081e805da79f1450fa2b25d0e13d6aa87427c747a88d65b2b6d6989", kill_on_drop: false }`
[INFO] [stderr]    Compiling typenum v1.18.0
[INFO] [stderr]    Compiling generic-array v1.2.0
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.89s
[INFO] running `Command { std: "docker" "inspect" "2a05501d0081e805da79f1450fa2b25d0e13d6aa87427c747a88d65b2b6d6989", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "2a05501d0081e805da79f1450fa2b25d0e13d6aa87427c747a88d65b2b6d6989", kill_on_drop: false }`
[INFO] [stdout] 2a05501d0081e805da79f1450fa2b25d0e13d6aa87427c747a88d65b2b6d6989
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f7d482e42ff3ec2fbd1d3e53ecb1d4d7ec86f57ba5d0dc1b5dd0bd8469780d9a
[INFO] running `Command { std: "docker" "start" "-a" "f7d482e42ff3ec2fbd1d3e53ecb1d4d7ec86f57ba5d0dc1b5dd0bd8469780d9a", kill_on_drop: false }`
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stdout]     |
[INFO] [stdout] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stdout]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `wide_null`
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stdout]     |
[INFO] [stdout] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stdout]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.40s
[INFO] running `Command { std: "docker" "inspect" "f7d482e42ff3ec2fbd1d3e53ecb1d4d7ec86f57ba5d0dc1b5dd0bd8469780d9a", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f7d482e42ff3ec2fbd1d3e53ecb1d4d7ec86f57ba5d0dc1b5dd0bd8469780d9a", kill_on_drop: false }`
[INFO] [stdout] f7d482e42ff3ec2fbd1d3e53ecb1d4d7ec86f57ba5d0dc1b5dd0bd8469780d9a
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+0d162b25edd5bf0dba9a22e83b614f1113e90474" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] 1c11bd8995dc48f6f6b3cde524a99294ee983cccd9de678b7fc93161bf82e85b
[INFO] running `Command { std: "docker" "start" "-a" "1c11bd8995dc48f6f6b3cde524a99294ee983cccd9de678b7fc93161bf82e85b", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `GenericArray`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stderr]   |
[INFO] [stderr] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stderr]   |                     ^^^^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::marker::PhantomData`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::marker::PhantomData;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `typenum::assert_type_eq`
[INFO] [stderr]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use typenum::assert_type_eq;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::intrinsics::transmute`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::mem::transmute_copy`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::mem::transmute_copy;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |                      ^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(deprecated)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stderr]    |
[INFO] [stderr] 17 |         transmute(self)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stderr]    |
[INFO] [stderr] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stderr]    |
[INFO] [stderr] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stderr]    |
[INFO] [stderr] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stderr]    |
[INFO] [stderr] 42 |         transmute(raw)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stderr]    |
[INFO] [stderr] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stderr]    |
[INFO] [stderr] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stderr]    |
[INFO] [stderr] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stderr]    |
[INFO] [stderr] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stderr]    |
[INFO] [stderr] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stderr]    |
[INFO] [stderr] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stderr]    |
[INFO] [stderr] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stderr]    |
[INFO] [stderr] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stderr]    |
[INFO] [stderr] 73 |     pub unsafe fn free(self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stderr]    |
[INFO] [stderr] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stderr]    |
[INFO] [stderr] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stderr]    |
[INFO] [stderr] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stderr]    |
[INFO] [stderr] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stderr]    |
[INFO] [stderr] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stderr] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stderr]    | |_____________________________________________^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stderr]     |
[INFO] [stderr] 102 |         *self.ptr = value;
[INFO] [stderr]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |                          ----^^^^
[INFO] [stderr]     |                          |
[INFO] [stderr]     |                          help: remove this `mut`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stderr]     |
[INFO] [stderr] 117 |             *self.ptr = value;
[INFO] [stderr]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |                                ----^^^^
[INFO] [stderr]     |                                |
[INFO] [stderr]     |                                help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stderr]     |
[INFO] [stderr] 134 |         self.ptr.as_ref()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stderr]     |
[INFO] [stderr] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stderr]     |
[INFO] [stderr] 139 |         self.ptr.as_mut()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |                                    ----^^^^
[INFO] [stderr]     |                                    |
[INFO] [stderr]     |                                    help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stderr]     |
[INFO] [stderr] 169 |         transmute(self)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stderr]     |
[INFO] [stderr] 174 |         transmute(self.ptr as *const U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stderr]     |
[INFO] [stderr] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stderr]     |
[INFO] [stderr] 179 |         transmute(self.ptr as *mut U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |                                         ----^^^^
[INFO] [stderr]     |                                         |
[INFO] [stderr]     |                                         help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stderr]     |
[INFO] [stderr] 184 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stderr]     |
[INFO] [stderr] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stderr]     |
[INFO] [stderr] 189 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stderr]     |
[INFO] [stderr] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stderr]     |
[INFO] [stderr] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: associated constant `NULL` is never used
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stderr]    |
[INFO] [stderr] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stderr]    | ---------------------------------- associated constant in this implementation
[INFO] [stderr] 21 |
[INFO] [stderr] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stderr]    |           ^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] For more information about this error, try `rustc --explain E0133`.
[INFO] [stderr] warning: `lv-std` (lib) generated 40 warnings (run `cargo fix --lib -p lv-std` to apply 33 suggestions)
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stderr]     |
[INFO] [stderr] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stderr]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `wide_null`
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stderr]     |
[INFO] [stderr] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stderr]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: `lv-std` (lib test) generated 41 warnings (39 duplicates) (run `cargo fix --lib -p lv-std --tests` to apply 1 suggestion)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.06s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/lv_std-b7da93c40730f8de)
[INFO] [stdout] 
[INFO] [stdout] running 1 test
[INFO] [stdout] test unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null ... FAILED
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null' (25) panicked at src/unsafe_std/ptrs/raw_ptr.rs:203:9:
[INFO] [stdout] void is not allowed in this context
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x5bbeafe91bc2 - std[3b51380354919863]::backtrace_rs::backtrace::libunwind::trace
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x5bbeafe91bc2 - std[3b51380354919863]::backtrace_rs::backtrace::trace_unsynchronized::<std[3b51380354919863]::sys::backtrace::_print_fmt::{closure#1}>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x5bbeafe91bc2 - std[3b51380354919863]::sys::backtrace::_print_fmt
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/backtrace.rs:74:9
[INFO] [stdout]    3:     0x5bbeafe91bc2 - <<std[3b51380354919863]::sys::backtrace::BacktraceLock>::print::DisplayBacktrace as core[27de1724e4349be2]::fmt::Display>::fmt
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/backtrace.rs:44:26
[INFO] [stdout]    4:     0x5bbeafea640a - <core[27de1724e4349be2]::fmt::rt::Argument>::fmt
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/fmt/rt.rs:152:76
[INFO] [stdout]    5:     0x5bbeafea640a - core[27de1724e4349be2]::fmt::write
[INFO] [stdout]    6:     0x5bbeafe969c6 - std[3b51380354919863]::io::default_write_fmt::<alloc[a57f19327c0ad893]::vec::Vec<u8>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/io/mod.rs:639:11
[INFO] [stdout]    7:     0x5bbeafe969c6 - <alloc[a57f19327c0ad893]::vec::Vec<u8> as std[3b51380354919863]::io::Write>::write_fmt
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/io/mod.rs:1994:13
[INFO] [stdout]    8:     0x5bbeafe7035f - <std[3b51380354919863]::sys::backtrace::BacktraceLock>::print
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/backtrace.rs:47:9
[INFO] [stdout]    9:     0x5bbeafe7035f - std[3b51380354919863]::panicking::default_hook::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:292:27
[INFO] [stdout]   10:     0x5bbeafe89ea9 - std[3b51380354919863]::panicking::default_hook
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:316:9
[INFO] [stdout]   11:     0x5bbeafe2592e - <alloc[a57f19327c0ad893]::boxed::Box<dyn for<'a, 'b> core[27de1724e4349be2]::ops::function::Fn<(&'a std[3b51380354919863]::panic::PanicHookInfo<'b>,), Output = ()> + core[27de1724e4349be2]::marker::Sync + core[27de1724e4349be2]::marker::Send> as core[27de1724e4349be2]::ops::function::Fn<(&std[3b51380354919863]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/alloc/src/boxed.rs:2220:9
[INFO] [stdout]   12:     0x5bbeafe2592e - test[182b2e79ecd7bbd9]::test_main_with_exit_callback::<test[182b2e79ecd7bbd9]::test_main::{closure#0}>::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x5bbeafe8a062 - <alloc[a57f19327c0ad893]::boxed::Box<dyn for<'a, 'b> core[27de1724e4349be2]::ops::function::Fn<(&'a std[3b51380354919863]::panic::PanicHookInfo<'b>,), Output = ()> + core[27de1724e4349be2]::marker::Sync + core[27de1724e4349be2]::marker::Send> as core[27de1724e4349be2]::ops::function::Fn<(&std[3b51380354919863]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/alloc/src/boxed.rs:2220:9
[INFO] [stdout]   14:     0x5bbeafe8a062 - std[3b51380354919863]::panicking::panic_with_hook
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:833:13
[INFO] [stdout]   15:     0x5bbeafe7044a - std[3b51380354919863]::panicking::panic_handler::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:691:13
[INFO] [stdout]   16:     0x5bbeafe65699 - std[3b51380354919863]::sys::backtrace::__rust_end_short_backtrace::<std[3b51380354919863]::panicking::panic_handler::{closure#0}, !>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/backtrace.rs:182:18
[INFO] [stdout]   17:     0x5bbeafe7126d - __rustc[d79c0ace40940972]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:689:5
[INFO] [stdout]   18:     0x5bbeafea6a7c - core[27de1724e4349be2]::panicking::panic_fmt
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/panicking.rs:80:14
[INFO] [stdout]   19:     0x5bbeafe19277 - <lv_std[2fca31548fe2120f]::unsafe_std::ptrs::raw_ptr::RawPtr<i32> as core[27de1724e4349be2]::ops::deref::Deref>::deref
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/ptr_utils.rs:5:21
[INFO] [stdout]   20:     0x5bbeafe19277 - lv_std[2fca31548fe2120f]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:258:33
[INFO] [stdout]   21:     0x5bbeafe18da7 - lv_std[2fca31548fe2120f]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::{closure#0}
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:254:26
[INFO] [stdout]   22:     0x5bbeafe19c06 - <lv_std[2fca31548fe2120f]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::{closure#0} as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   23:     0x5bbeafe19cdb - <fn() -> core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String> as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   24:     0x5bbeafe19cdb - test[182b2e79ecd7bbd9]::__rust_begin_short_backtrace::<core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String>, fn() -> core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:663:18
[INFO] [stdout]   25:     0x5bbeafe2653a - test[182b2e79ecd7bbd9]::run_test_in_process::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:686:74
[INFO] [stdout]   26:     0x5bbeafe2653a - <core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<test[182b2e79ecd7bbd9]::run_test_in_process::{closure#0}> as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stdout]   27:     0x5bbeafe2653a - std[3b51380354919863]::panicking::catch_unwind::do_call::<core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<test[182b2e79ecd7bbd9]::run_test_in_process::{closure#0}>, core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:581:40
[INFO] [stdout]   28:     0x5bbeafe2653a - std[3b51380354919863]::panicking::catch_unwind::<core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String>, core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<test[182b2e79ecd7bbd9]::run_test_in_process::{closure#0}>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:544:19
[INFO] [stdout]   29:     0x5bbeafe2653a - std[3b51380354919863]::panic::catch_unwind::<core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<test[182b2e79ecd7bbd9]::run_test_in_process::{closure#0}>, core[27de1724e4349be2]::result::Result<(), alloc[a57f19327c0ad893]::string::String>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panic.rs:359:14
[INFO] [stdout]   30:     0x5bbeafe2653a - test[182b2e79ecd7bbd9]::run_test_in_process
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:686:27
[INFO] [stdout]   31:     0x5bbeafe2653a - test[182b2e79ecd7bbd9]::run_test::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:607:43
[INFO] [stdout]   32:     0x5bbeafe21ae4 - test[182b2e79ecd7bbd9]::run_test::{closure#1}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/test/src/lib.rs:637:41
[INFO] [stdout]   33:     0x5bbeafe21ae4 - std[3b51380354919863]::sys::backtrace::__rust_begin_short_backtrace::<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/backtrace.rs:166:18
[INFO] [stdout]   34:     0x5bbeafe29032 - std[3b51380354919863]::thread::lifecycle::spawn_unchecked::<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/thread/lifecycle.rs:91:13
[INFO] [stdout]   35:     0x5bbeafe29032 - <core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<std[3b51380354919863]::thread::lifecycle::spawn_unchecked<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}> as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stdout]   36:     0x5bbeafe29032 - std[3b51380354919863]::panicking::catch_unwind::do_call::<core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<std[3b51380354919863]::thread::lifecycle::spawn_unchecked<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:581:40
[INFO] [stdout]   37:     0x5bbeafe29032 - std[3b51380354919863]::panicking::catch_unwind::<(), core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<std[3b51380354919863]::thread::lifecycle::spawn_unchecked<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panicking.rs:544:19
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] [stdout]   38:     0x5bbeafe29032 - std[3b51380354919863]::panic::catch_unwind::<core[27de1724e4349be2]::panic::unwind_safe::AssertUnwindSafe<std[3b51380354919863]::thread::lifecycle::spawn_unchecked<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/panic.rs:359:14
[INFO] [stdout]   39:     0x5bbeafe29032 - std[3b51380354919863]::thread::lifecycle::spawn_unchecked::<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/thread/lifecycle.rs:89:26
[INFO] [stdout]   40:     0x5bbeafe29032 - <std[3b51380354919863]::thread::lifecycle::spawn_unchecked<test[182b2e79ecd7bbd9]::run_test::{closure#1}, ()>::{closure#1} as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once::{shim:vtable#0}
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   41:     0x5bbeafe9146f - <alloc[a57f19327c0ad893]::boxed::Box<dyn core[27de1724e4349be2]::ops::function::FnOnce<(), Output = ()> + core[27de1724e4349be2]::marker::Send> as core[27de1724e4349be2]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/alloc/src/boxed.rs:2206:9
[INFO] [stdout]   42:     0x5bbeafe9146f - <std[3b51380354919863]::sys::thread::unix::Thread>::new::thread_start
[INFO] [stdout]                                at /rustc/0d162b25edd5bf0dba9a22e83b614f1113e90474/library/std/src/sys/thread/unix.rs:119:17
[INFO] [stdout]   43:     0x73e06c53caa4 - <unknown>
[INFO] [stdout]   44:     0x73e06c5c9a64 - clone
[INFO] [stdout]   45:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 0 passed; 1 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.04s
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "1c11bd8995dc48f6f6b3cde524a99294ee983cccd9de678b7fc93161bf82e85b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "1c11bd8995dc48f6f6b3cde524a99294ee983cccd9de678b7fc93161bf82e85b", kill_on_drop: false }`
[INFO] [stdout] 1c11bd8995dc48f6f6b3cde524a99294ee983cccd9de678b7fc93161bf82e85b
