[INFO] fetching crate lv-std 0.0.2...
[INFO] testing lv-std-0.0.2 against try#db823df02fd0c2cf67b43025ac3fef3f2d743245 for pr-150681
[INFO] extracting crate lv-std 0.0.2 into /workspace/builds/worker-6-tc2/source
[INFO] started tweaking crates.io crate lv-std 0.0.2
[INFO] finished tweaking crates.io crate lv-std 0.0.2
[INFO] tweaked toml for crates.io crate lv-std 0.0.2 written to /workspace/builds/worker-6-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate lv-std 0.0.2 on toolchain db823df02fd0c2cf67b43025ac3fef3f2d743245
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate crates.io crate lv-std 0.0.2 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 038963fa157d90e65e6ffe3411cd042c8456693f7cc3e80e223207857270bbaf
[INFO] running `Command { std: "docker" "start" "-a" "038963fa157d90e65e6ffe3411cd042c8456693f7cc3e80e223207857270bbaf", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "038963fa157d90e65e6ffe3411cd042c8456693f7cc3e80e223207857270bbaf", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "038963fa157d90e65e6ffe3411cd042c8456693f7cc3e80e223207857270bbaf", kill_on_drop: false }`
[INFO] [stdout] 038963fa157d90e65e6ffe3411cd042c8456693f7cc3e80e223207857270bbaf
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 8af3e582fcd4b40e384de9cbf33b1a5664b1b91d7e14dcb3e472280c68df8dc4
[INFO] running `Command { std: "docker" "start" "-a" "8af3e582fcd4b40e384de9cbf33b1a5664b1b91d7e14dcb3e472280c68df8dc4", kill_on_drop: false }`
[INFO] [stderr]    Compiling typenum v1.18.0
[INFO] [stderr]    Compiling generic-array v1.2.0
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.83s
[INFO] running `Command { std: "docker" "inspect" "8af3e582fcd4b40e384de9cbf33b1a5664b1b91d7e14dcb3e472280c68df8dc4", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "8af3e582fcd4b40e384de9cbf33b1a5664b1b91d7e14dcb3e472280c68df8dc4", kill_on_drop: false }`
[INFO] [stdout] 8af3e582fcd4b40e384de9cbf33b1a5664b1b91d7e14dcb3e472280c68df8dc4
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 18a7f7a86f92cb7132e757458dc37be873fe2acc868213a0bb7b2636b90df884
[INFO] running `Command { std: "docker" "start" "-a" "18a7f7a86f92cb7132e757458dc37be873fe2acc868213a0bb7b2636b90df884", kill_on_drop: false }`
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated constant `NULL` is never used
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stdout]    |
[INFO] [stdout] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stdout]    | ---------------------------------- associated constant in this implementation
[INFO] [stdout] 21 |
[INFO] [stdout] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stdout]    |           ^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]    Compiling lv-std v0.0.2 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `GenericArray`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stdout]   |
[INFO] [stdout] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stdout]   |                     ^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::marker::PhantomData`
[INFO] [stdout]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::marker::PhantomData;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `typenum::assert_type_eq`
[INFO] [stdout]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use typenum::assert_type_eq;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::intrinsics::transmute`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::mem::transmute_copy`
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stdout]   |
[INFO] [stdout] 2 | use std::mem::transmute_copy;
[INFO] [stdout]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stdout]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stdout]   |
[INFO] [stdout] 1 | use std::intrinsics::transmute;
[INFO] [stdout]   |                      ^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(deprecated)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stdout]    |
[INFO] [stdout] 17 |         transmute(self)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stdout]    |
[INFO] [stdout] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stdout]    |
[INFO] [stdout] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stdout]    |
[INFO] [stdout] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stdout]    |
[INFO] [stdout] 42 |         transmute(raw)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stdout]    |
[INFO] [stdout] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stdout]    |
[INFO] [stdout] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stdout]    |
[INFO] [stdout] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stdout]    |
[INFO] [stdout] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stdout]    |
[INFO] [stdout] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stdout]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stdout]    |
[INFO] [stdout] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stdout]    |
[INFO] [stdout] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stdout]    |
[INFO] [stdout] 73 |     pub unsafe fn free(self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stdout]    |
[INFO] [stdout] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stdout]    |
[INFO] [stdout] 79 |         &*self.ptr.offset(index)
[INFO] [stdout]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stdout]    |
[INFO] [stdout] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stdout]    |
[INFO] [stdout] 84 |         &mut *self.ptr.offset(index)
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stdout]    |
[INFO] [stdout] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stdout]    |
[INFO] [stdout] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stdout]    |
[INFO] [stdout] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stdout] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stdout]    | |_____________________________________________^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stdout]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stdout]    |
[INFO] [stdout] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stdout]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stdout]     |
[INFO] [stdout] 102 |         *self.ptr = value;
[INFO] [stdout]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stdout]     |
[INFO] [stdout] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stdout]     |                          ----^^^^
[INFO] [stdout]     |                          |
[INFO] [stdout]     |                          help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stdout]     |
[INFO] [stdout] 108 |         self.assign(transmute_copy(&value));
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stdout]     |
[INFO] [stdout] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stdout]     |
[INFO] [stdout] 117 |             *self.ptr = value;
[INFO] [stdout]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stdout]     |
[INFO] [stdout] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stdout]     |                                ----^^^^
[INFO] [stdout]     |                                |
[INFO] [stdout]     |                                help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stdout]     |
[INFO] [stdout] 134 |         self.ptr.as_ref()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stdout]     |
[INFO] [stdout] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stdout]     |
[INFO] [stdout] 139 |         self.ptr.as_mut()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stdout]     |
[INFO] [stdout] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stdout]     |                                    ----^^^^
[INFO] [stdout]     |                                    |
[INFO] [stdout]     |                                    help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stdout]     |
[INFO] [stdout] 169 |         transmute(self)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stdout]     |
[INFO] [stdout] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stdout]     |
[INFO] [stdout] 174 |         transmute(self.ptr as *const U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stdout]     |
[INFO] [stdout] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stdout]     |
[INFO] [stdout] 179 |         transmute(self.ptr as *mut U)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stdout]     |
[INFO] [stdout] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stdout]     |                                         ----^^^^
[INFO] [stdout]     |                                         |
[INFO] [stdout]     |                                         help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stdout]     |
[INFO] [stdout] 184 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stdout]     |
[INFO] [stdout] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stdout]     |
[INFO] [stdout] 189 |         transmute(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stdout]     |
[INFO] [stdout] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stdout]     |                                           ----^^^^
[INFO] [stdout]     |                                           |
[INFO] [stdout]     |                                           help: remove this `mut`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stdout]     |
[INFO] [stdout] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stdout]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stdout]     |
[INFO] [stdout] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unnecessary `unsafe` block
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stdout]     |
[INFO] [stdout] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stdout]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `wide_null`
[INFO] [stdout]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stdout]     |
[INFO] [stdout] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stdout]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.30s
[INFO] running `Command { std: "docker" "inspect" "18a7f7a86f92cb7132e757458dc37be873fe2acc868213a0bb7b2636b90df884", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "18a7f7a86f92cb7132e757458dc37be873fe2acc868213a0bb7b2636b90df884", kill_on_drop: false }`
[INFO] [stdout] 18a7f7a86f92cb7132e757458dc37be873fe2acc868213a0bb7b2636b90df884
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:845e597a41426bbf2703be69acdb67d10b6de511142d05cba7bbe119c898b2c7" "/opt/rustwide/cargo-home/bin/cargo" "+db823df02fd0c2cf67b43025ac3fef3f2d743245" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] e2a499ce42f1f5b2ec303b2a6448c65c1dd8374682a21f54d740a35f3cfb6601
[INFO] running `Command { std: "docker" "start" "-a" "e2a499ce42f1f5b2ec303b2a6448c65c1dd8374682a21f54d740a35f3cfb6601", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `GenericArray`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:1:21
[INFO] [stderr]   |
[INFO] [stderr] 1 | use generic_array::{GenericArray, ArrayLength};
[INFO] [stderr]   |                     ^^^^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::marker::PhantomData`
[INFO] [stderr]  --> src/unsafe_std/c/opaque_handle.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::marker::PhantomData;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `typenum::assert_type_eq`
[INFO] [stderr]  --> src/unsafe_std/ptrs/ptr_utils.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use typenum::assert_type_eq;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::intrinsics::transmute`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:5
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `std::mem::transmute_copy`
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:2:5
[INFO] [stderr]   |
[INFO] [stderr] 2 | use std::mem::transmute_copy;
[INFO] [stderr]   |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: use of deprecated module `std::intrinsics`: import this function via `std::mem` instead
[INFO] [stderr]  --> src/unsafe_std/ptrs/into_raw_ptr.rs:1:22
[INFO] [stderr]   |
[INFO] [stderr] 1 | use std::intrinsics::transmute;
[INFO] [stderr]   |                      ^^^^^^^^^
[INFO] [stderr]   |
[INFO] [stderr]   = note: `#[warn(deprecated)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:17:9
[INFO] [stderr]    |
[INFO] [stderr] 17 |         transmute(self)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/opaque_handle.rs:16:5
[INFO] [stderr]    |
[INFO] [stderr] 16 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]    = note: `#[warn(unsafe_op_in_unsafe_fn)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:36:9
[INFO] [stderr]    |
[INFO] [stderr] 36 |         RawPtr::<u8>::from(self.buffer.as_ptr()).cast()
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/c/handle_buffer.rs:35:5
[INFO] [stderr]    |
[INFO] [stderr] 35 |     unsafe fn to_ptr(&self) -> RawPtr<Self::Pointee> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:42:9
[INFO] [stderr]    |
[INFO] [stderr] 42 |         transmute(raw)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:41:5
[INFO] [stderr]    |
[INFO] [stderr] 41 |     pub const unsafe fn from_raw(raw: *mut T) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:50:18
[INFO] [stderr]    |
[INFO] [stderr] 50 |             ptr: alloc_zeroed(Layout::new::<T>()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:47:5
[INFO] [stderr]    |
[INFO] [stderr] 47 |     pub unsafe fn alloc() -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc_zeroed` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:59:18
[INFO] [stderr]    |
[INFO] [stderr] 59 |             ptr: alloc_zeroed(Layout::array::<T>(amount).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:56:5
[INFO] [stderr]    |
[INFO] [stderr] 56 |     pub unsafe fn calloc(amount: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::alloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:67:18
[INFO] [stderr]    |
[INFO] [stderr] 67 |             ptr: alloc(Layout::array::<u8>(size).unwrap()) as *mut T,
[INFO] [stderr]    |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:65:5
[INFO] [stderr]    |
[INFO] [stderr] 65 |     pub unsafe fn malloc(size: usize) -> RawPtr<T> {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::alloc::dealloc` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:74:9
[INFO] [stderr]    |
[INFO] [stderr] 74 |         dealloc(self.ptr as *mut u8, Layout::new::<Self>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:73:5
[INFO] [stderr]    |
[INFO] [stderr] 73 |     pub unsafe fn free(self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:10
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |          ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:78:5
[INFO] [stderr]    |
[INFO] [stderr] 78 |     pub const unsafe fn index<'a>(self, index: isize) -> &'a T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:79:11
[INFO] [stderr]    |
[INFO] [stderr] 79 |         &*self.ptr.offset(index)
[INFO] [stderr]    |           ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:14
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |              ^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:83:5
[INFO] [stderr]    |
[INFO] [stderr] 83 |     pub const unsafe fn index_mut<'a>(self, index: isize) -> &'a mut T {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::offset` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:84:15
[INFO] [stderr]    |
[INFO] [stderr] 84 |         &mut *self.ptr.offset(index)
[INFO] [stderr]    |               ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:89:9
[INFO] [stderr]    |
[INFO] [stderr] 89 |         copy_nonoverlapping(self.ptr, other.ptr, size_of::<T>());
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:88:5
[INFO] [stderr]    |
[INFO] [stderr] 88 |     pub const unsafe fn copy_to(self, other: &mut Self) {
[INFO] [stderr]    |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::copy_nonoverlapping` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:9
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:93:5
[INFO] [stderr]    |
[INFO] [stderr] 93 | /     pub unsafe fn mem_copy_to<D : IntoRawPtr>(self, other: D, size: usize)
[INFO] [stderr] 94 | |     where <D as IntoRawPtr>::Pointee: 'static
[INFO] [stderr]    | |_____________________________________________^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::cast` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::into_raw_ptr::IntoRawPtr::to_ptr` is unsafe and requires unsafe block
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:96:39
[INFO] [stderr]    |
[INFO] [stderr] 96 |         copy_nonoverlapping(self.ptr, other.to_ptr().cast().ptr, size)
[INFO] [stderr]    |                                       ^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]    |
[INFO] [stderr]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]    = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:102:9
[INFO] [stderr]     |
[INFO] [stderr] 102 |         *self.ptr = value;
[INFO] [stderr]     |         ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:5
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:100:26
[INFO] [stderr]     |
[INFO] [stderr] 100 |     pub unsafe fn assign(mut self, value: T) {
[INFO] [stderr]     |                          ----^^^^
[INFO] [stderr]     |                          |
[INFO] [stderr]     |                          help: remove this `mut`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::assign` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:9
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:5
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::mem::transmute_copy` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:108:21
[INFO] [stderr]     |
[INFO] [stderr] 108 |         self.assign(transmute_copy(&value));
[INFO] [stderr]     |                     ^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:106:43
[INFO] [stderr]     |
[INFO] [stderr] 106 |     pub unsafe fn assign_cast<D: 'static>(mut self, value: D) {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:117:13
[INFO] [stderr]     |
[INFO] [stderr] 117 |             *self.ptr = value;
[INFO] [stderr]     |             ^^^^^^^^^ dereference of raw pointer
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:5
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:112:32
[INFO] [stderr]     |
[INFO] [stderr] 112 |     pub unsafe fn assign_check(mut self, value: T) -> ptr_utils::PtrState {
[INFO] [stderr]     |                                ----^^^^
[INFO] [stderr]     |                                |
[INFO] [stderr]     |                                help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_ref` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:134:9
[INFO] [stderr]     |
[INFO] [stderr] 134 |         self.ptr.as_ref()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:133:5
[INFO] [stderr]     |
[INFO] [stderr] 133 |     pub const unsafe fn as_ref<'a>(self) -> Option<&'a T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::ptr::mut_ptr::<impl *mut T>::as_mut` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:139:9
[INFO] [stderr]     |
[INFO] [stderr] 139 |         self.ptr.as_mut()
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:5
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:138:36
[INFO] [stderr]     |
[INFO] [stderr] 138 |     pub const unsafe fn as_mut<'a>(mut self) -> Option<&'a mut T> {
[INFO] [stderr]     |                                    ----^^^^
[INFO] [stderr]     |                                    |
[INFO] [stderr]     |                                    help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:169:9
[INFO] [stderr]     |
[INFO] [stderr] 169 |         transmute(self)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:168:5
[INFO] [stderr]     |
[INFO] [stderr] 168 |     pub const unsafe fn cast<U>(self) -> RawPtr<U> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:174:9
[INFO] [stderr]     |
[INFO] [stderr] 174 |         transmute(self.ptr as *const U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:173:5
[INFO] [stderr]     |
[INFO] [stderr] 173 |     pub const unsafe fn cast_ref<'a, U>(self) -> &'a U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:179:9
[INFO] [stderr]     |
[INFO] [stderr] 179 |         transmute(self.ptr as *mut U)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:5
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:178:41
[INFO] [stderr]     |
[INFO] [stderr] 178 |     pub const unsafe fn cast_mut<'a, U>(mut self) -> &'a mut U {
[INFO] [stderr]     |                                         ----^^^^
[INFO] [stderr]     |                                         |
[INFO] [stderr]     |                                         help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:184:9
[INFO] [stderr]     |
[INFO] [stderr] 184 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:183:5
[INFO] [stderr]     |
[INFO] [stderr] 183 |     pub const unsafe fn cast_raw<U>(self) -> *mut U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `std::intrinsics::transmute` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:189:9
[INFO] [stderr]     |
[INFO] [stderr] 189 |         transmute(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:5
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: variable does not need to be mutable
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:188:43
[INFO] [stderr]     |
[INFO] [stderr] 188 |     pub const unsafe fn cast_const_raw<U>(mut self) -> *const U {
[INFO] [stderr]     |                                           ----^^^^
[INFO] [stderr]     |                                           |
[INFO] [stderr]     |                                           help: remove this `mut`
[INFO] [stderr] 
[INFO] [stderr] warning[E0133]: call to unsafe function `unsafe_std::ptrs::raw_ptr::RawPtr::<T>::from_raw` is unsafe and requires unsafe block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:194:9
[INFO] [stderr]     |
[INFO] [stderr] 194 |         RawPtr::<T>::from_raw(self.ptr)
[INFO] [stderr]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function
[INFO] [stderr]     |
[INFO] [stderr]     = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/unsafe-op-in-unsafe-fn.html>
[INFO] [stderr]     = note: consult the function's documentation for information on how to avoid undefined behavior
[INFO] [stderr] note: an unsafe function restricts its caller, but its body is safe by default
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:193:5
[INFO] [stderr]     |
[INFO] [stderr] 193 |     pub const unsafe fn to_owned(&self) -> RawPtr<T> {
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: associated constant `NULL` is never used
[INFO] [stderr]   --> src/unsafe_std/ptrs/raw_ptr.rs:22:11
[INFO] [stderr]    |
[INFO] [stderr] 20 | impl<T: 'static + Sized> RawPtr<T> {
[INFO] [stderr]    | ---------------------------------- associated constant in this implementation
[INFO] [stderr] 21 |
[INFO] [stderr] 22 |     const NULL: RawPtr<T> = RawPtr::null();
[INFO] [stderr]    |           ^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] For more information about this error, try `rustc --explain E0133`.
[INFO] [stderr] warning: `lv-std` (lib) generated 40 warnings (run `cargo fix --lib -p lv-std` to apply 33 suggestions)
[INFO] [stderr] warning: unnecessary `unsafe` block
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:258:13
[INFO] [stderr]     |
[INFO] [stderr] 258 |             unsafe { assert_eq!(*p_x, 32); }
[INFO] [stderr]     |             ^^^^^^ unnecessary `unsafe` block
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_unsafe)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `wide_null`
[INFO] [stderr]    --> src/unsafe_std/ptrs/raw_ptr.rs:261:17
[INFO] [stderr]     |
[INFO] [stderr] 261 |             let wide_null: *mut dyn Debug = thin_null as *mut dyn Debug;
[INFO] [stderr]     |                 ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_wide_null`
[INFO] [stderr]     |
[INFO] [stderr]     = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default
[INFO] [stderr] 
[INFO] [stderr] warning: `lv-std` (lib test) generated 41 warnings (39 duplicates) (run `cargo fix --lib -p lv-std --tests` to apply 1 suggestion)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.08s
[INFO] [stderr]      Running unittests src/lib.rs (/opt/rustwide/target/debug/deps/lv_std-b7da93c40730f8de)
[INFO] [stdout] 
[INFO] [stdout] running 1 test
[INFO] [stdout] test unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null ... FAILED
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null' (25) panicked at src/unsafe_std/ptrs/raw_ptr.rs:203:9:
[INFO] [stdout] void is not allowed in this context
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x5f4823b54bc2 - std[3f03f8b59f91bef1]::backtrace_rs::backtrace::libunwind::trace
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x5f4823b54bc2 - std[3f03f8b59f91bef1]::backtrace_rs::backtrace::trace_unsynchronized::<std[3f03f8b59f91bef1]::sys::backtrace::_print_fmt::{closure#1}>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x5f4823b54bc2 - std[3f03f8b59f91bef1]::sys::backtrace::_print_fmt
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/backtrace.rs:74:9
[INFO] [stdout]    3:     0x5f4823b54bc2 - <<std[3f03f8b59f91bef1]::sys::backtrace::BacktraceLock>::print::DisplayBacktrace as core[585f66e14d78f9ba]::fmt::Display>::fmt
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/backtrace.rs:44:26
[INFO] [stdout]    4:     0x5f4823b6940a - <core[585f66e14d78f9ba]::fmt::rt::Argument>::fmt
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/fmt/rt.rs:152:76
[INFO] [stdout]    5:     0x5f4823b6940a - core[585f66e14d78f9ba]::fmt::write
[INFO] [stdout]    6:     0x5f4823b599c6 - std[3f03f8b59f91bef1]::io::default_write_fmt::<alloc[15e7b27aba85d2e2]::vec::Vec<u8>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/io/mod.rs:639:11
[INFO] [stdout]    7:     0x5f4823b599c6 - <alloc[15e7b27aba85d2e2]::vec::Vec<u8> as std[3f03f8b59f91bef1]::io::Write>::write_fmt
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/io/mod.rs:1994:13
[INFO] [stdout]    8:     0x5f4823b3335f - <std[3f03f8b59f91bef1]::sys::backtrace::BacktraceLock>::print
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/backtrace.rs:47:9
[INFO] [stdout]    9:     0x5f4823b3335f - std[3f03f8b59f91bef1]::panicking::default_hook::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:292:27
[INFO] [stdout]   10:     0x5f4823b4cef9 - std[3f03f8b59f91bef1]::panicking::default_hook
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:316:9
[INFO] [stdout]   11:     0x5f4823ae892e - <alloc[15e7b27aba85d2e2]::boxed::Box<dyn for<'a, 'b> core[585f66e14d78f9ba]::ops::function::Fn<(&'a std[3f03f8b59f91bef1]::panic::PanicHookInfo<'b>,), Output = ()> + core[585f66e14d78f9ba]::marker::Sync + core[585f66e14d78f9ba]::marker::Send> as core[585f66e14d78f9ba]::ops::function::Fn<(&std[3f03f8b59f91bef1]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/alloc/src/boxed.rs:2220:9
[INFO] [stdout]   12:     0x5f4823ae892e - test[30224e0cb089acd2]::test_main_with_exit_callback::<test[30224e0cb089acd2]::test_main::{closure#0}>::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x5f4823b4d0b2 - <alloc[15e7b27aba85d2e2]::boxed::Box<dyn for<'a, 'b> core[585f66e14d78f9ba]::ops::function::Fn<(&'a std[3f03f8b59f91bef1]::panic::PanicHookInfo<'b>,), Output = ()> + core[585f66e14d78f9ba]::marker::Sync + core[585f66e14d78f9ba]::marker::Send> as core[585f66e14d78f9ba]::ops::function::Fn<(&std[3f03f8b59f91bef1]::panic::PanicHookInfo,)>>::call
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/alloc/src/boxed.rs:2220:9
[INFO] [stdout]   14:     0x5f4823b4d0b2 - std[3f03f8b59f91bef1]::panicking::panic_with_hook
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:833:13
[INFO] [stdout]   15:     0x5f4823b3344a - std[3f03f8b59f91bef1]::panicking::panic_handler::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:691:13
[INFO] [stdout]   16:     0x5f4823b28609 - std[3f03f8b59f91bef1]::sys::backtrace::__rust_end_short_backtrace::<std[3f03f8b59f91bef1]::panicking::panic_handler::{closure#0}, !>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/backtrace.rs:182:18
[INFO] [stdout]   17:     0x5f4823b3426d - __rustc[caa99d26c7bae192]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:689:5
[INFO] [stdout]   18:     0x5f4823b69a7c - core[585f66e14d78f9ba]::panicking::panic_fmt
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/panicking.rs:80:14
[INFO] [stdout]   19:     0x5f4823adc277 - <lv_std[3a87dbf8a009a384]::unsafe_std::ptrs::raw_ptr::RawPtr<i32> as core[585f66e14d78f9ba]::ops::deref::Deref>::deref
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/ptr_utils.rs:5:21
[INFO] [stdout]   20:     0x5f4823adc277 - lv_std[3a87dbf8a009a384]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:258:33
[INFO] [stdout]   21:     0x5f4823adbda7 - lv_std[3a87dbf8a009a384]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::{closure#0}
[INFO] [stdout]                                at /opt/rustwide/workdir/src/unsafe_std/ptrs/raw_ptr.rs:254:26
[INFO] [stdout]   22:     0x5f4823adcc06 - <lv_std[3a87dbf8a009a384]::unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null::{closure#0} as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   23:     0x5f4823adccdb - <fn() -> core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String> as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   24:     0x5f4823adccdb - test[30224e0cb089acd2]::__rust_begin_short_backtrace::<core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String>, fn() -> core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:663:18
[INFO] [stdout]   25:     0x5f4823ae953a - test[30224e0cb089acd2]::run_test_in_process::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:686:74
[INFO] [stdout]   26:     0x5f4823ae953a - <core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<test[30224e0cb089acd2]::run_test_in_process::{closure#0}> as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stdout]   27:     0x5f4823ae953a - std[3f03f8b59f91bef1]::panicking::catch_unwind::do_call::<core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<test[30224e0cb089acd2]::run_test_in_process::{closure#0}>, core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:581:40
[INFO] [stdout]   28:     0x5f4823ae953a - std[3f03f8b59f91bef1]::panicking::catch_unwind::<core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String>, core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<test[30224e0cb089acd2]::run_test_in_process::{closure#0}>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:544:19
[INFO] [stdout]   29:     0x5f4823ae953a - std[3f03f8b59f91bef1]::panic::catch_unwind::<core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<test[30224e0cb089acd2]::run_test_in_process::{closure#0}>, core[585f66e14d78f9ba]::result::Result<(), alloc[15e7b27aba85d2e2]::string::String>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panic.rs:359:14
[INFO] [stdout]   30:     0x5f4823ae953a - test[30224e0cb089acd2]::run_test_in_process
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:686:27
[INFO] [stdout]   31:     0x5f4823ae953a - test[30224e0cb089acd2]::run_test::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:607:43
[INFO] [stdout]   32:     0x5f4823ae3a04 - test[30224e0cb089acd2]::run_test::{closure#1}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/test/src/lib.rs:637:41
[INFO] [stdout]   33:     0x5f4823ae3a04 - std[3f03f8b59f91bef1]::sys::backtrace::__rust_begin_short_backtrace::<test[30224e0cb089acd2]::run_test::{closure#1}, ()>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/backtrace.rs:166:18
[INFO] [stdout]   34:     0x5f4823aec032 - std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked::<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/thread/lifecycle.rs:91:13
[INFO] [stdout]   35:     0x5f4823aec032 - <core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}> as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/panic/unwind_safe.rs:274:9
[INFO] [stdout]   36:     0x5f4823aec032 - std[3f03f8b59f91bef1]::panicking::catch_unwind::do_call::<core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:581:40
[INFO] [stdout]   37:     0x5f4823aec032 - std[3f03f8b59f91bef1]::panicking::catch_unwind::<(), core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panicking.rs:544:19
[INFO] [stdout]   38:     0x5f4823aec032 - std[3f03f8b59f91bef1]::panic::catch_unwind::<core[585f66e14d78f9ba]::panic::unwind_safe::AssertUnwindSafe<std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}::{closure#0}>, ()>
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/panic.rs:359:14
[INFO] [stdout]   39:     0x5f4823aec032 - std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked::<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/thread/lifecycle.rs:89:26
[INFO] [stdout]   40:     0x5f4823aec032 - <std[3f03f8b59f91bef1]::thread::lifecycle::spawn_unchecked<test[30224e0cb089acd2]::run_test::{closure#1}, ()>::{closure#1} as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once::{shim:vtable#0}
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   41:     0x5f4823b5446f - <alloc[15e7b27aba85d2e2]::boxed::Box<dyn core[585f66e14d78f9ba]::ops::function::FnOnce<(), Output = ()> + core[585f66e14d78f9ba]::marker::Send> as core[585f66e14d78f9ba]::ops::function::FnOnce<()>>::call_once
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/alloc/src/boxed.rs:2206:9
[INFO] [stdout]   42:     0x5f4823b5446f - <std[3f03f8b59f91bef1]::sys::thread::unix::Thread>::new::thread_start
[INFO] [stdout]                                at /rustc/db823df02fd0c2cf67b43025ac3fef3f2d743245/library/std/src/sys/thread/unix.rs:119:17
[INFO] [stdout]   43:     0x7c8d51e6aaa4 - <unknown>
[INFO] [stdout]   44:     0x7c8d51ef7a64 - clone
[INFO] [stdout]   45:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     unsafe_std::ptrs::raw_ptr::tests::ptr::new_and_null
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 0 passed; 1 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.02s
[INFO] [stdout] 
[INFO] [stderr] error: test failed, to rerun pass `--lib`
[INFO] running `Command { std: "docker" "inspect" "e2a499ce42f1f5b2ec303b2a6448c65c1dd8374682a21f54d740a35f3cfb6601", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e2a499ce42f1f5b2ec303b2a6448c65c1dd8374682a21f54d740a35f3cfb6601", kill_on_drop: false }`
[INFO] [stdout] e2a499ce42f1f5b2ec303b2a6448c65c1dd8374682a21f54d740a35f3cfb6601
