Unnamed repository; edit this file 'description' to name the repository.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
3119
3120
3121
3122
3123
3124
3125
3126
3127
3128
3129
3130
3131
3132
3133
3134
3135
3136
3137
3138
3139
3140
3141
3142
3143
3144
3145
3146
3147
3148
3149
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
3163
3164
3165
3166
3167
3168
3169
3170
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
3182
3183
3184
3185
3186
3187
3188
3189
3190
3191
3192
3193
3194
3195
3196
3197
3198
3199
3200
3201
3202
3203
3204
3205
3206
3207
3208
3209
3210
3211
3212
3213
3214
3215
3216
3217
3218
3219
3220
3221
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
3235
3236
3237
3238
3239
3240
3241
3242
3243
3244
3245
3246
3247
3248
3249
3250
3251
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
3281
3282
3283
3284
3285
3286
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
3306
3307
3308
3309
3310
3311
3312
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
3332
3333
3334
3335
3336
3337
3338
3339
3340
3341
3342
//! `render` module provides utilities for rendering completion suggestions
//! into code pieces that will be presented to user.

pub(crate) mod const_;
pub(crate) mod function;
pub(crate) mod literal;
pub(crate) mod macro_;
pub(crate) mod pattern;
pub(crate) mod type_alias;
pub(crate) mod union_literal;
pub(crate) mod variant;

use hir::{AsAssocItem, HasAttrs, HirDisplay, ModuleDef, ScopeDef, Type, sym};
use ide_db::text_edit::TextEdit;
use ide_db::{
    RootDatabase, SnippetCap, SymbolKind,
    documentation::{Documentation, HasDocs},
    helpers::item_name,
    imports::import_assets::LocatedImport,
};
use syntax::{AstNode, SmolStr, SyntaxKind, TextRange, ToSmolStr, ast, format_smolstr};

use crate::{
    CompletionContext, CompletionItem, CompletionItemKind, CompletionItemRefMode,
    CompletionRelevance,
    context::{DotAccess, DotAccessKind, PathCompletionCtx, PathKind, PatternContext},
    item::{Builder, CompletionRelevanceTypeMatch},
    render::{
        function::render_fn,
        literal::render_variant_lit,
        macro_::{render_macro, render_macro_pat},
    },
};
/// Interface for data and methods required for items rendering.
#[derive(Debug, Clone)]
pub(crate) struct RenderContext<'a> {
    completion: &'a CompletionContext<'a>,
    is_private_editable: bool,
    import_to_add: Option<LocatedImport>,
    doc_aliases: Vec<SmolStr>,
}

impl<'a> RenderContext<'a> {
    pub(crate) fn new(completion: &'a CompletionContext<'a>) -> RenderContext<'a> {
        RenderContext {
            completion,
            is_private_editable: false,
            import_to_add: None,
            doc_aliases: vec![],
        }
    }

    pub(crate) fn private_editable(mut self, private_editable: bool) -> Self {
        self.is_private_editable = private_editable;
        self
    }

    pub(crate) fn import_to_add(mut self, import_to_add: Option<LocatedImport>) -> Self {
        self.import_to_add = import_to_add;
        self
    }

    pub(crate) fn doc_aliases(mut self, doc_aliases: Vec<SmolStr>) -> Self {
        self.doc_aliases = doc_aliases;
        self
    }

    fn snippet_cap(&self) -> Option<SnippetCap> {
        self.completion.config.snippet_cap
    }

    fn db(&self) -> &'a RootDatabase {
        self.completion.db
    }

    fn source_range(&self) -> TextRange {
        self.completion.source_range()
    }

    fn completion_relevance(&self) -> CompletionRelevance {
        CompletionRelevance {
            is_private_editable: self.is_private_editable,
            requires_import: self.import_to_add.is_some(),
            ..Default::default()
        }
    }

    fn is_immediately_after_macro_bang(&self) -> bool {
        self.completion.token.kind() == SyntaxKind::BANG
            && self.completion.token.parent().is_some_and(|it| it.kind() == SyntaxKind::MACRO_CALL)
    }

    fn is_deprecated(&self, def: impl HasAttrs) -> bool {
        let attrs = def.attrs(self.db());
        attrs.by_key(sym::deprecated).exists()
    }

    fn is_deprecated_assoc_item(&self, as_assoc_item: impl AsAssocItem) -> bool {
        let db = self.db();
        let assoc = match as_assoc_item.as_assoc_item(db) {
            Some(assoc) => assoc,
            None => return false,
        };

        let is_assoc_deprecated = match assoc {
            hir::AssocItem::Function(it) => self.is_deprecated(it),
            hir::AssocItem::Const(it) => self.is_deprecated(it),
            hir::AssocItem::TypeAlias(it) => self.is_deprecated(it),
        };
        is_assoc_deprecated
            || assoc
                .container_or_implemented_trait(db)
                .map(|trait_| self.is_deprecated(trait_))
                .unwrap_or(false)
    }

    // FIXME: remove this
    fn docs(&self, def: impl HasDocs) -> Option<Documentation> {
        def.docs(self.db())
    }
}

pub(crate) fn render_field(
    ctx: RenderContext<'_>,
    dot_access: &DotAccess<'_>,
    receiver: Option<SmolStr>,
    field: hir::Field,
    ty: &hir::Type<'_>,
) -> CompletionItem {
    let db = ctx.db();
    let is_deprecated = ctx.is_deprecated(field);
    let name = field.name(db);
    let (name, escaped_name) =
        (name.as_str().to_smolstr(), name.display_no_db(ctx.completion.edition).to_smolstr());
    let mut item = CompletionItem::new(
        SymbolKind::Field,
        ctx.source_range(),
        field_with_receiver(receiver.as_deref(), &name),
        ctx.completion.edition,
    );
    item.set_relevance(CompletionRelevance {
        type_match: compute_type_match(ctx.completion, ty),
        exact_name_match: compute_exact_name_match(ctx.completion, &name),
        is_skipping_completion: receiver.is_some(),
        ..CompletionRelevance::default()
    });
    item.detail(ty.display(db, ctx.completion.display_target).to_string())
        .set_documentation(field.docs(db))
        .set_deprecated(is_deprecated)
        .lookup_by(name);

    let is_field_access = matches!(dot_access.kind, DotAccessKind::Field { .. });
    if !is_field_access || ty.is_fn() || ty.is_closure() {
        let mut builder = TextEdit::builder();
        // Using TextEdit, insert '(' before the struct name and ')' before the
        // dot access, then comes the field name and optionally insert function
        // call parens.

        builder.replace(
            ctx.source_range(),
            field_with_receiver(receiver.as_deref(), &escaped_name).into(),
        );

        let expected_fn_type =
            ctx.completion.expected_type.as_ref().is_some_and(|ty| ty.is_fn() || ty.is_closure());

        if !expected_fn_type
            && let Some(receiver) = &dot_access.receiver
            && let Some(receiver) = ctx.completion.sema.original_ast_node(receiver.clone())
        {
            builder.insert(receiver.syntax().text_range().start(), "(".to_owned());
            builder.insert(ctx.source_range().end(), ")".to_owned());

            let is_parens_needed = !matches!(dot_access.kind, DotAccessKind::Method);

            if is_parens_needed {
                builder.insert(ctx.source_range().end(), "()".to_owned());
            }
        }

        item.text_edit(builder.finish());
    } else {
        item.insert_text(field_with_receiver(receiver.as_deref(), &escaped_name));
    }
    if let Some(receiver) = &dot_access.receiver
        && let Some(original) = ctx.completion.sema.original_ast_node(receiver.clone())
        && let Some(ref_mode) = compute_ref_match(ctx.completion, ty)
    {
        item.ref_match(ref_mode, original.syntax().text_range().start());
    }
    item.doc_aliases(ctx.doc_aliases);
    item.build(db)
}

fn field_with_receiver(receiver: Option<&str>, field_name: &str) -> SmolStr {
    receiver
        .map_or_else(|| field_name.into(), |receiver| format_smolstr!("{}.{field_name}", receiver))
}

pub(crate) fn render_tuple_field(
    ctx: RenderContext<'_>,
    receiver: Option<SmolStr>,
    field: usize,
    ty: &hir::Type<'_>,
) -> CompletionItem {
    let mut item = CompletionItem::new(
        SymbolKind::Field,
        ctx.source_range(),
        field_with_receiver(receiver.as_deref(), &field.to_string()),
        ctx.completion.edition,
    );
    item.detail(ty.display(ctx.db(), ctx.completion.display_target).to_string())
        .lookup_by(field.to_string());
    item.set_relevance(CompletionRelevance {
        is_skipping_completion: receiver.is_some(),
        ..ctx.completion_relevance()
    });
    item.build(ctx.db())
}

pub(crate) fn render_type_inference(
    ty_string: String,
    ctx: &CompletionContext<'_>,
) -> CompletionItem {
    let mut builder = CompletionItem::new(
        CompletionItemKind::InferredType,
        ctx.source_range(),
        ty_string,
        ctx.edition,
    );
    builder.set_relevance(CompletionRelevance {
        type_match: Some(CompletionRelevanceTypeMatch::Exact),
        exact_name_match: true,
        ..Default::default()
    });
    builder.build(ctx.db)
}

pub(crate) fn render_path_resolution(
    ctx: RenderContext<'_>,
    path_ctx: &PathCompletionCtx<'_>,
    local_name: hir::Name,
    resolution: ScopeDef,
) -> Builder {
    render_resolution_path(ctx, path_ctx, local_name, None, resolution)
}

pub(crate) fn render_pattern_resolution(
    ctx: RenderContext<'_>,
    pattern_ctx: &PatternContext,
    local_name: hir::Name,
    resolution: ScopeDef,
) -> Builder {
    render_resolution_pat(ctx, pattern_ctx, local_name, None, resolution)
}

pub(crate) fn render_resolution_with_import(
    ctx: RenderContext<'_>,
    path_ctx: &PathCompletionCtx<'_>,
    import_edit: LocatedImport,
) -> Option<Builder> {
    let resolution = ScopeDef::from(import_edit.original_item);
    let local_name = get_import_name(resolution, &ctx, &import_edit)?;
    // This now just renders the alias text, but we need to find the aliases earlier and call this with the alias instead.
    let doc_aliases = ctx.completion.doc_aliases_in_scope(resolution);
    let ctx = ctx.doc_aliases(doc_aliases);
    Some(render_resolution_path(ctx, path_ctx, local_name, Some(import_edit), resolution))
}

pub(crate) fn render_resolution_with_import_pat(
    ctx: RenderContext<'_>,
    pattern_ctx: &PatternContext,
    import_edit: LocatedImport,
) -> Option<Builder> {
    let resolution = ScopeDef::from(import_edit.original_item);
    let local_name = get_import_name(resolution, &ctx, &import_edit)?;
    Some(render_resolution_pat(ctx, pattern_ctx, local_name, Some(import_edit), resolution))
}

pub(crate) fn render_expr(
    ctx: &CompletionContext<'_>,
    expr: &hir::term_search::Expr<'_>,
) -> Option<Builder> {
    let mut i = 1;
    let mut snippet_formatter = |ty: &hir::Type<'_>| {
        let arg_name = ty
            .as_adt()
            .map(|adt| stdx::to_lower_snake_case(adt.name(ctx.db).as_str()))
            .unwrap_or_else(|| String::from("_"));
        let res = format!("${{{i}:{arg_name}}}");
        i += 1;
        res
    };

    let mut label_formatter = |ty: &hir::Type<'_>| {
        ty.as_adt()
            .map(|adt| stdx::to_lower_snake_case(adt.name(ctx.db).as_str()))
            .unwrap_or_else(|| String::from("..."))
    };

    let cfg = ctx.config.find_path_config(ctx.is_nightly);

    let label =
        expr.gen_source_code(&ctx.scope, &mut label_formatter, cfg, ctx.display_target).ok()?;

    let source_range = match ctx.original_token.parent() {
        Some(node) => match node.ancestors().find_map(ast::Path::cast) {
            Some(path) => path.syntax().text_range(),
            None => node.text_range(),
        },
        None => ctx.source_range(),
    };

    let mut item =
        CompletionItem::new(CompletionItemKind::Expression, source_range, label, ctx.edition);

    let snippet = format!(
        "{}$0",
        expr.gen_source_code(&ctx.scope, &mut snippet_formatter, cfg, ctx.display_target).ok()?
    );
    let edit = TextEdit::replace(source_range, snippet);
    item.snippet_edit(ctx.config.snippet_cap?, edit);
    item.documentation(Documentation::new(String::from("Autogenerated expression by term search")));
    item.set_relevance(crate::CompletionRelevance {
        type_match: compute_type_match(ctx, &expr.ty(ctx.db)),
        ..Default::default()
    });
    for trait_ in expr.traits_used(ctx.db) {
        let trait_item = hir::ItemInNs::from(hir::ModuleDef::from(trait_));
        let Some(path) = ctx.module.find_path(ctx.db, trait_item, cfg) else {
            continue;
        };

        item.add_import(LocatedImport::new_no_completion(path, trait_item, trait_item));
    }

    Some(item)
}

fn get_import_name(
    resolution: ScopeDef,
    ctx: &RenderContext<'_>,
    import_edit: &LocatedImport,
) -> Option<hir::Name> {
    // FIXME: Temporary workaround for handling aliased import.
    // This should be removed after we have proper support for importing alias.
    // <https://github.com/rust-lang/rust-analyzer/issues/14079>

    // If `item_to_import` matches `original_item`, we are importing the item itself (not its parent module).
    // In this case, we can use the last segment of `import_path`, as it accounts for the aliased name.
    if import_edit.item_to_import == import_edit.original_item {
        import_edit.import_path.segments().last().cloned()
    } else {
        scope_def_to_name(resolution, ctx, import_edit)
    }
}

fn scope_def_to_name(
    resolution: ScopeDef,
    ctx: &RenderContext<'_>,
    import_edit: &LocatedImport,
) -> Option<hir::Name> {
    Some(match resolution {
        ScopeDef::ModuleDef(hir::ModuleDef::Function(f)) => f.name(ctx.completion.db),
        ScopeDef::ModuleDef(hir::ModuleDef::Const(c)) => c.name(ctx.completion.db)?,
        ScopeDef::ModuleDef(hir::ModuleDef::TypeAlias(t)) => t.name(ctx.completion.db),
        _ => item_name(ctx.db(), import_edit.original_item)?,
    })
}

fn render_resolution_pat(
    ctx: RenderContext<'_>,
    pattern_ctx: &PatternContext,
    local_name: hir::Name,
    import_to_add: Option<LocatedImport>,
    resolution: ScopeDef,
) -> Builder {
    let _p = tracing::info_span!("render_resolution_pat").entered();
    use hir::ModuleDef::*;

    if let ScopeDef::ModuleDef(Macro(mac)) = resolution {
        let ctx = ctx.import_to_add(import_to_add);
        render_macro_pat(ctx, pattern_ctx, local_name, mac)
    } else {
        render_resolution_simple_(ctx, &local_name, import_to_add, resolution)
    }
}

fn render_resolution_path(
    ctx: RenderContext<'_>,
    path_ctx: &PathCompletionCtx<'_>,
    local_name: hir::Name,
    import_to_add: Option<LocatedImport>,
    resolution: ScopeDef,
) -> Builder {
    let _p = tracing::info_span!("render_resolution_path").entered();
    use hir::ModuleDef::*;

    let krate = ctx.completion.display_target;

    match resolution {
        ScopeDef::ModuleDef(Macro(mac)) => {
            let ctx = ctx.import_to_add(import_to_add);
            return render_macro(ctx, path_ctx, local_name, mac);
        }
        ScopeDef::ModuleDef(Function(func)) => {
            let ctx = ctx.import_to_add(import_to_add);
            return render_fn(ctx, path_ctx, Some(local_name), func);
        }
        ScopeDef::ModuleDef(Variant(var)) => {
            let ctx = ctx.clone().import_to_add(import_to_add.clone());
            if let Some(item) =
                render_variant_lit(ctx, path_ctx, Some(local_name.clone()), var, None)
            {
                return item;
            }
        }
        _ => (),
    }

    let completion = ctx.completion;
    let cap = ctx.snippet_cap();
    let db = completion.db;
    let config = completion.config;
    let requires_import = import_to_add.is_some();

    let name = local_name.display_no_db(ctx.completion.edition).to_smolstr();
    let mut item = render_resolution_simple_(ctx, &local_name, import_to_add, resolution);
    if local_name.needs_escape(completion.edition) {
        item.insert_text(local_name.display_no_db(completion.edition).to_smolstr());
    }
    // Add `<>` for generic types
    let type_path_no_ty_args = matches!(
        path_ctx,
        PathCompletionCtx { kind: PathKind::Type { .. }, has_type_args: false, .. }
    ) && config.callable.is_some();
    if type_path_no_ty_args && let Some(cap) = cap {
        let has_non_default_type_params = match resolution {
            ScopeDef::ModuleDef(hir::ModuleDef::Adt(it)) => it.has_non_default_type_params(db),
            ScopeDef::ModuleDef(hir::ModuleDef::TypeAlias(it)) => {
                it.has_non_default_type_params(db)
            }
            _ => false,
        };

        if has_non_default_type_params {
            cov_mark::hit!(inserts_angle_brackets_for_generics);
            item.lookup_by(name.clone())
                .label(SmolStr::from_iter([&name, "<…>"]))
                .trigger_call_info()
                .insert_snippet(cap, format!("{}<$0>", local_name.display(db, completion.edition)));
        }
    }

    let mut set_item_relevance = |ty: Type<'_>| {
        if !ty.is_unknown() {
            item.detail(ty.display(db, krate).to_string());
        }

        item.set_relevance(CompletionRelevance {
            type_match: compute_type_match(completion, &ty),
            exact_name_match: compute_exact_name_match(completion, &name),
            is_local: matches!(resolution, ScopeDef::Local(_)),
            requires_import,
            ..CompletionRelevance::default()
        });

        path_ref_match(completion, path_ctx, &ty, &mut item);
    };

    match resolution {
        ScopeDef::Local(local) => set_item_relevance(local.ty(db)),
        ScopeDef::ModuleDef(ModuleDef::Adt(adt)) | ScopeDef::AdtSelfType(adt) => {
            set_item_relevance(adt.ty(db))
        }
        // Filtered out above
        ScopeDef::ModuleDef(
            ModuleDef::Function(_) | ModuleDef::Variant(_) | ModuleDef::Macro(_),
        ) => (),
        ScopeDef::ModuleDef(ModuleDef::Const(konst)) => set_item_relevance(konst.ty(db)),
        ScopeDef::ModuleDef(ModuleDef::Static(stat)) => set_item_relevance(stat.ty(db)),
        ScopeDef::ModuleDef(ModuleDef::BuiltinType(bt)) => set_item_relevance(bt.ty(db)),
        ScopeDef::ImplSelfType(imp) => set_item_relevance(imp.self_ty(db)),
        ScopeDef::GenericParam(_)
        | ScopeDef::Label(_)
        | ScopeDef::Unknown
        | ScopeDef::ModuleDef(
            ModuleDef::Trait(_) | ModuleDef::Module(_) | ModuleDef::TypeAlias(_),
        ) => (),
    };

    item
}

fn render_resolution_simple_(
    ctx: RenderContext<'_>,
    local_name: &hir::Name,
    import_to_add: Option<LocatedImport>,
    resolution: ScopeDef,
) -> Builder {
    let _p = tracing::info_span!("render_resolution_simple_").entered();

    let db = ctx.db();
    let ctx = ctx.import_to_add(import_to_add);
    let kind = res_to_kind(resolution);

    let mut item = CompletionItem::new(
        kind,
        ctx.source_range(),
        local_name.as_str().to_smolstr(),
        ctx.completion.edition,
    );
    item.set_relevance(ctx.completion_relevance())
        .set_documentation(scope_def_docs(db, resolution))
        .set_deprecated(scope_def_is_deprecated(&ctx, resolution));

    if let Some(import_to_add) = ctx.import_to_add {
        item.add_import(import_to_add);
    }

    item.doc_aliases(ctx.doc_aliases);
    item
}

fn res_to_kind(resolution: ScopeDef) -> CompletionItemKind {
    use hir::ModuleDef::*;
    match resolution {
        ScopeDef::Unknown => CompletionItemKind::UnresolvedReference,
        ScopeDef::ModuleDef(Function(_)) => CompletionItemKind::SymbolKind(SymbolKind::Function),
        ScopeDef::ModuleDef(Variant(_)) => CompletionItemKind::SymbolKind(SymbolKind::Variant),
        ScopeDef::ModuleDef(Macro(_)) => CompletionItemKind::SymbolKind(SymbolKind::Macro),
        ScopeDef::ModuleDef(Module(..)) => CompletionItemKind::SymbolKind(SymbolKind::Module),
        ScopeDef::ModuleDef(Adt(adt)) => CompletionItemKind::SymbolKind(match adt {
            hir::Adt::Struct(_) => SymbolKind::Struct,
            hir::Adt::Union(_) => SymbolKind::Union,
            hir::Adt::Enum(_) => SymbolKind::Enum,
        }),
        ScopeDef::ModuleDef(Const(..)) => CompletionItemKind::SymbolKind(SymbolKind::Const),
        ScopeDef::ModuleDef(Static(..)) => CompletionItemKind::SymbolKind(SymbolKind::Static),
        ScopeDef::ModuleDef(Trait(..)) => CompletionItemKind::SymbolKind(SymbolKind::Trait),
        ScopeDef::ModuleDef(TypeAlias(..)) => CompletionItemKind::SymbolKind(SymbolKind::TypeAlias),
        ScopeDef::ModuleDef(BuiltinType(..)) => CompletionItemKind::BuiltinType,
        ScopeDef::GenericParam(param) => CompletionItemKind::SymbolKind(match param {
            hir::GenericParam::TypeParam(_) => SymbolKind::TypeParam,
            hir::GenericParam::ConstParam(_) => SymbolKind::ConstParam,
            hir::GenericParam::LifetimeParam(_) => SymbolKind::LifetimeParam,
        }),
        ScopeDef::Local(..) => CompletionItemKind::SymbolKind(SymbolKind::Local),
        ScopeDef::Label(..) => CompletionItemKind::SymbolKind(SymbolKind::Label),
        ScopeDef::AdtSelfType(..) | ScopeDef::ImplSelfType(..) => {
            CompletionItemKind::SymbolKind(SymbolKind::SelfParam)
        }
    }
}

fn scope_def_docs(db: &RootDatabase, resolution: ScopeDef) -> Option<Documentation> {
    use hir::ModuleDef::*;
    match resolution {
        ScopeDef::ModuleDef(Module(it)) => it.docs(db),
        ScopeDef::ModuleDef(Adt(it)) => it.docs(db),
        ScopeDef::ModuleDef(Variant(it)) => it.docs(db),
        ScopeDef::ModuleDef(Const(it)) => it.docs(db),
        ScopeDef::ModuleDef(Static(it)) => it.docs(db),
        ScopeDef::ModuleDef(Trait(it)) => it.docs(db),
        ScopeDef::ModuleDef(TypeAlias(it)) => it.docs(db),
        _ => None,
    }
}

fn scope_def_is_deprecated(ctx: &RenderContext<'_>, resolution: ScopeDef) -> bool {
    match resolution {
        ScopeDef::ModuleDef(it) => ctx.is_deprecated_assoc_item(it),
        ScopeDef::GenericParam(it) => ctx.is_deprecated(it),
        ScopeDef::AdtSelfType(it) => ctx.is_deprecated(it),
        _ => false,
    }
}

// FIXME: This checks types without possible coercions which some completions might want to do
fn match_types(
    ctx: &CompletionContext<'_>,
    ty1: &hir::Type<'_>,
    ty2: &hir::Type<'_>,
) -> Option<CompletionRelevanceTypeMatch> {
    if ty1 == ty2 {
        Some(CompletionRelevanceTypeMatch::Exact)
    } else if ty1.could_unify_with(ctx.db, ty2) {
        Some(CompletionRelevanceTypeMatch::CouldUnify)
    } else {
        None
    }
}

fn compute_type_match(
    ctx: &CompletionContext<'_>,
    completion_ty: &hir::Type<'_>,
) -> Option<CompletionRelevanceTypeMatch> {
    let expected_type = ctx.expected_type.as_ref()?;

    // We don't ever consider unit type to be an exact type match, since
    // nearly always this is not meaningful to the user.
    if expected_type.is_unit() {
        return None;
    }

    match_types(ctx, expected_type, completion_ty)
}

fn compute_exact_name_match(ctx: &CompletionContext<'_>, completion_name: &str) -> bool {
    ctx.expected_name.as_ref().is_some_and(|name| name.text() == completion_name)
}

fn compute_ref_match(
    ctx: &CompletionContext<'_>,
    completion_ty: &hir::Type<'_>,
) -> Option<CompletionItemRefMode> {
    let expected_type = ctx.expected_type.as_ref()?;
    let expected_without_ref = expected_type.remove_ref();
    let completion_without_ref = completion_ty.remove_ref();
    if expected_type.could_unify_with(ctx.db, completion_ty) {
        return None;
    }
    if let Some(expected_without_ref) = &expected_without_ref
        && completion_ty.autoderef(ctx.db).any(|ty| ty == *expected_without_ref)
    {
        cov_mark::hit!(suggest_ref);
        let mutability = if expected_type.is_mutable_reference() {
            hir::Mutability::Mut
        } else {
            hir::Mutability::Shared
        };
        return Some(CompletionItemRefMode::Reference(mutability));
    }

    if let Some(completion_without_ref) = completion_without_ref
        && completion_without_ref == *expected_type
        && completion_without_ref.is_copy(ctx.db)
    {
        cov_mark::hit!(suggest_deref);
        return Some(CompletionItemRefMode::Dereference);
    }

    None
}

fn path_ref_match(
    completion: &CompletionContext<'_>,
    path_ctx: &PathCompletionCtx<'_>,
    ty: &hir::Type<'_>,
    item: &mut Builder,
) {
    if let Some(original_path) = &path_ctx.original_path {
        // At least one char was typed by the user already, in that case look for the original path
        if let Some(original_path) = completion.sema.original_ast_node(original_path.clone())
            && let Some(ref_mode) = compute_ref_match(completion, ty)
        {
            item.ref_match(ref_mode, original_path.syntax().text_range().start());
        }
    } else {
        // completion requested on an empty identifier, there is no path here yet.
        // FIXME: This might create inconsistent completions where we show a ref match in macro inputs
        // as long as nothing was typed yet
        if let Some(ref_mode) = compute_ref_match(completion, ty) {
            item.ref_match(ref_mode, completion.position.offset);
        }
    }
}

#[cfg(test)]
mod tests {
    use std::cmp;

    use expect_test::{Expect, expect};
    use ide_db::SymbolKind;
    use itertools::Itertools;

    use crate::{
        CompletionItem, CompletionItemKind, CompletionRelevance, CompletionRelevancePostfixMatch,
        item::CompletionRelevanceTypeMatch,
        tests::{TEST_CONFIG, check_edit, do_completion, get_all_items},
    };

    #[track_caller]
    fn check(
        #[rust_analyzer::rust_fixture] ra_fixture: &str,
        kind: impl Into<CompletionItemKind>,
        expect: Expect,
    ) {
        let actual = do_completion(ra_fixture, kind.into());
        expect.assert_debug_eq(&actual);
    }

    #[track_caller]
    fn check_kinds(
        #[rust_analyzer::rust_fixture] ra_fixture: &str,
        kinds: &[CompletionItemKind],
        expect: Expect,
    ) {
        let actual: Vec<_> =
            kinds.iter().flat_map(|&kind| do_completion(ra_fixture, kind)).collect();
        expect.assert_debug_eq(&actual);
    }

    #[track_caller]
    fn check_function_relevance(#[rust_analyzer::rust_fixture] ra_fixture: &str, expect: Expect) {
        let actual: Vec<_> =
            do_completion(ra_fixture, CompletionItemKind::SymbolKind(SymbolKind::Method))
                .into_iter()
                .map(|item| (item.detail.unwrap_or_default(), item.relevance.function))
                .collect();

        expect.assert_debug_eq(&actual);
    }

    #[track_caller]
    fn check_relevance_for_kinds(
        #[rust_analyzer::rust_fixture] ra_fixture: &str,
        kinds: &[CompletionItemKind],
        expect: Expect,
    ) {
        let mut actual = get_all_items(TEST_CONFIG, ra_fixture, None);
        actual.retain(|it| kinds.contains(&it.kind));
        actual.sort_by_key(|it| (cmp::Reverse(it.relevance.score()), it.label.primary.clone()));
        check_relevance_(actual, expect);
    }

    #[track_caller]
    fn check_relevance(#[rust_analyzer::rust_fixture] ra_fixture: &str, expect: Expect) {
        let mut actual = get_all_items(TEST_CONFIG, ra_fixture, None);
        actual.retain(|it| it.kind != CompletionItemKind::Snippet);
        actual.retain(|it| it.kind != CompletionItemKind::Keyword);
        actual.retain(|it| it.kind != CompletionItemKind::BuiltinType);
        actual.sort_by_key(|it| (cmp::Reverse(it.relevance.score()), it.label.primary.clone()));
        check_relevance_(actual, expect);
    }

    #[track_caller]
    fn check_relevance_(actual: Vec<CompletionItem>, expect: Expect) {
        let actual = actual
            .into_iter()
            .flat_map(|it| {
                let mut items = vec![];

                let tag = it.kind.tag();
                let relevance = display_relevance(it.relevance);
                items.push(format!(
                    "{tag} {} {} {relevance}\n",
                    it.label.primary,
                    it.label.detail_right.clone().unwrap_or_default(),
                ));

                if let Some((label, _indel, relevance)) = it.ref_match() {
                    let relevance = display_relevance(relevance);

                    items.push(format!("{tag} {label} {relevance}\n"));
                }

                items
            })
            .collect::<String>();

        expect.assert_eq(&actual);

        fn display_relevance(relevance: CompletionRelevance) -> String {
            let relevance_factors = vec![
                (relevance.type_match == Some(CompletionRelevanceTypeMatch::Exact), "type"),
                (
                    relevance.type_match == Some(CompletionRelevanceTypeMatch::CouldUnify),
                    "type_could_unify",
                ),
                (relevance.exact_name_match, "name"),
                (relevance.is_local, "local"),
                (
                    relevance.postfix_match == Some(CompletionRelevancePostfixMatch::Exact),
                    "snippet",
                ),
                (relevance.trait_.is_some_and(|it| it.is_op_method), "op_method"),
                (relevance.requires_import, "requires_import"),
            ]
            .into_iter()
            .filter_map(|(cond, desc)| if cond { Some(desc) } else { None })
            .join("+");

            format!("[{relevance_factors}]")
        }
    }

    #[test]
    fn set_struct_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub struct Struct {}
}

pub mod test_mod_a {
    pub struct Struct {}
}

//- /main.rs crate:main deps:dep

fn test(input: dep::test_mod_b::Struct) { }

fn main() {
    test(Struct$0);
}
"#,
            expect![[r#"
                st dep::test_mod_b::Struct {…} dep::test_mod_b::Struct {  } [type_could_unify]
                ex dep::test_mod_b::Struct {  }  [type_could_unify]
                st Struct Struct [type_could_unify+requires_import]
                md dep  []
                fn main() fn() []
                fn test(…) fn(Struct) []
                st Struct Struct [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_union_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub union Union {
        a: i32,
        b: i32
    }
}

pub mod test_mod_a {
    pub enum Union {
        a: i32,
        b: i32
    }
}

//- /main.rs crate:main deps:dep

fn test(input: dep::test_mod_b::Union) { }

fn main() {
    test(Union$0);
}
"#,
            expect![[r#"
                un Union Union [type_could_unify+requires_import]
                md dep  []
                fn main() fn() []
                fn test(…) fn(Union) []
                en Union Union [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_enum_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub enum Enum {
        variant
    }
}

pub mod test_mod_a {
    pub enum Enum {
        variant
    }
}

//- /main.rs crate:main deps:dep

fn test(input: dep::test_mod_b::Enum) { }

fn main() {
    test(Enum$0);
}
"#,
            expect![[r#"
                ev dep::test_mod_b::Enum::variant dep::test_mod_b::Enum::variant [type_could_unify]
                ex dep::test_mod_b::Enum::variant  [type_could_unify]
                en Enum Enum [type_could_unify+requires_import]
                md dep  []
                fn main() fn() []
                fn test(…) fn(Enum) []
                en Enum Enum [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_enum_variant_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub enum Enum {
        Variant
    }
}

pub mod test_mod_a {
    pub enum Enum {
        Variant
    }
}

//- /main.rs crate:main deps:dep

fn test(input: dep::test_mod_b::Enum) { }

fn main() {
    test(Variant$0);
}
"#,
            expect![[r#"
                ev dep::test_mod_b::Enum::Variant dep::test_mod_b::Enum::Variant [type_could_unify]
                ex dep::test_mod_b::Enum::Variant  [type_could_unify]
                md dep  []
                fn main() fn() []
                fn test(…) fn(Enum) []
            "#]],
        );
    }

    #[test]
    fn set_fn_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub fn function(j: isize) -> i32 {}
}

pub mod test_mod_a {
    pub fn function(i: usize) -> i32 {}
}

//- /main.rs crate:main deps:dep

fn test(input: fn(usize) -> i32) { }

fn main() {
    test(function$0);
}
"#,
            expect![[r#"
                md dep  []
                fn main() fn() []
                fn test(…) fn(fn(usize) -> i32) []
                fn function fn(usize) -> i32 [requires_import]
                fn function(…) fn(isize) -> i32 [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_const_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub const CONST: i32 = 1;
}

pub mod test_mod_a {
    pub const CONST: i64 = 2;
}

//- /main.rs crate:main deps:dep

fn test(input: i32) { }

fn main() {
    test(CONST$0);
}
"#,
            expect![[r#"
                ct CONST i32 [type_could_unify+requires_import]
                md dep  []
                fn main() fn() []
                fn test(…) fn(i32) []
                ct CONST i64 [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_static_type_completion_info() {
        check_relevance(
            r#"
//- /lib.rs crate:dep

pub mod test_mod_b {
    pub static STATIC: i32 = 5;
}

pub mod test_mod_a {
    pub static STATIC: i64 = 5;
}

//- /main.rs crate:main deps:dep

fn test(input: i32) { }

fn main() {
    test(STATIC$0);
}
"#,
            expect![[r#"
                sc STATIC i32 [type_could_unify+requires_import]
                md dep  []
                fn main() fn() []
                fn test(…) fn(i32) []
                sc STATIC i64 [requires_import]
            "#]],
        );
    }

    #[test]
    fn set_self_type_completion_info_with_params() {
        check_relevance(
            r#"
//- /lib.rs crate:dep
pub struct Struct;

impl Struct {
    pub fn Function(&self, input: i32) -> bool {
                false
    }
}


//- /main.rs crate:main deps:dep

use dep::Struct;


fn test(input: fn(&dep::Struct, i32) -> bool) { }

fn main() {
    test(Struct::Function$0);
}

"#,
            expect![[r#"
                me Function fn(&self, i32) -> bool []
            "#]],
        );
    }

    #[test]
    fn set_self_type_completion_info() {
        check_relevance(
            r#"
//- /main.rs crate:main

struct Struct;

impl Struct {
fn test(&self) {
        func(Self$0);
    }
}

fn func(input: Struct) { }

"#,
            expect![[r#"
                st Self Self [type]
                st Struct Struct [type]
                sp Self Struct [type]
                st Struct Struct [type]
                ex Struct  [type]
                lc self &Struct [local]
                fn func(…) fn(Struct) []
                me self.test() fn(&self) []
            "#]],
        );
    }

    #[test]
    fn set_builtin_type_completion_info() {
        check_relevance(
            r#"
//- /main.rs crate:main

fn test(input: bool) { }
    pub Input: bool = false;

fn main() {
    let input = false;
    let inputbad = 3;
    test(inp$0);
}
"#,
            expect![[r#"
                lc input bool [type+name+local]
                ex false  [type]
                ex input  [type]
                ex true  [type]
                lc inputbad i32 [local]
                fn main() fn() []
                fn test(…) fn(bool) []
            "#]],
        );
    }

    #[test]
    fn enum_detail_includes_record_fields() {
        check(
            r#"
enum Foo { Foo { x: i32, y: i32 } }

fn main() { Foo::Fo$0 }
"#,
            SymbolKind::Variant,
            expect![[r#"
                [
                    CompletionItem {
                        label: "Foo {…}",
                        detail_left: None,
                        detail_right: Some(
                            "Foo { x: i32, y: i32 }",
                        ),
                        source_range: 54..56,
                        delete: 54..56,
                        insert: "Foo { x: ${1:()}, y: ${2:()} }$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        lookup: "Foo{}",
                        detail: "Foo { x: i32, y: i32 }",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn enum_detail_includes_tuple_fields() {
        check(
            r#"
enum Foo { Foo (i32, i32) }

fn main() { Foo::Fo$0 }
"#,
            SymbolKind::Variant,
            expect![[r#"
                [
                    CompletionItem {
                        label: "Foo(…)",
                        detail_left: None,
                        detail_right: Some(
                            "Foo(i32, i32)",
                        ),
                        source_range: 46..48,
                        delete: 46..48,
                        insert: "Foo(${1:()}, ${2:()})$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        lookup: "Foo()",
                        detail: "Foo(i32, i32)",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn fn_detail_includes_args_and_return_type() {
        check(
            r#"
fn foo<T>(a: u32, b: u32, t: T) -> (u32, T) { (a, t) }

fn main() { fo$0 }
"#,
            SymbolKind::Function,
            expect![[r#"
                [
                    CompletionItem {
                        label: "foo(…)",
                        detail_left: None,
                        detail_right: Some(
                            "fn(u32, u32, T) -> (u32, T)",
                        ),
                        source_range: 68..70,
                        delete: 68..70,
                        insert: "foo(${1:a}, ${2:b}, ${3:t})$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "foo",
                        detail: "fn(u32, u32, T) -> (u32, T)",
                        trigger_call_info: true,
                    },
                    CompletionItem {
                        label: "main()",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 68..70,
                        delete: 68..70,
                        insert: "main();$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "main",
                        detail: "fn()",
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn fn_detail_includes_variadics() {
        check(
            r#"
unsafe extern "C" fn foo(a: u32, b: u32, ...) {}

fn main() { fo$0 }
"#,
            SymbolKind::Function,
            expect![[r#"
                [
                    CompletionItem {
                        label: "foo(…)",
                        detail_left: None,
                        detail_right: Some(
                            "unsafe fn(u32, u32, ...)",
                        ),
                        source_range: 62..64,
                        delete: 62..64,
                        insert: "foo(${1:a}, ${2:b});$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "foo",
                        detail: "unsafe fn(u32, u32, ...)",
                        trigger_call_info: true,
                    },
                    CompletionItem {
                        label: "main()",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 62..64,
                        delete: 62..64,
                        insert: "main();$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "main",
                        detail: "fn()",
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn enum_detail_just_name_for_unit() {
        check(
            r#"
enum Foo { Foo }

fn main() { Foo::Fo$0 }
"#,
            SymbolKind::Variant,
            expect![[r#"
                [
                    CompletionItem {
                        label: "Foo",
                        detail_left: None,
                        detail_right: Some(
                            "Foo",
                        ),
                        source_range: 35..37,
                        delete: 35..37,
                        insert: "Foo$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        detail: "Foo",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: false,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn lookup_enums_by_two_qualifiers() {
        check_kinds(
            r#"
mod m {
    pub enum Spam { Foo, Bar(i32) }
}
fn main() { let _: m::Spam = S$0 }
"#,
            &[
                CompletionItemKind::SymbolKind(SymbolKind::Function),
                CompletionItemKind::SymbolKind(SymbolKind::Module),
                CompletionItemKind::SymbolKind(SymbolKind::Variant),
            ],
            expect![[r#"
                [
                    CompletionItem {
                        label: "main()",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 75..76,
                        delete: 75..76,
                        insert: "main();$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "main",
                        detail: "fn()",
                    },
                    CompletionItem {
                        label: "m",
                        detail_left: None,
                        detail_right: None,
                        source_range: 75..76,
                        delete: 75..76,
                        insert: "m",
                        kind: SymbolKind(
                            Module,
                        ),
                    },
                    CompletionItem {
                        label: "m::Spam::Bar(…)",
                        detail_left: None,
                        detail_right: Some(
                            "m::Spam::Bar(i32)",
                        ),
                        source_range: 75..76,
                        delete: 75..76,
                        insert: "m::Spam::Bar(${1:()})$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        lookup: "Spam::Bar()",
                        detail: "m::Spam::Bar(i32)",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: Some(
                                Exact,
                            ),
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                    CompletionItem {
                        label: "m::Spam::Foo",
                        detail_left: None,
                        detail_right: Some(
                            "m::Spam::Foo",
                        ),
                        source_range: 75..76,
                        delete: 75..76,
                        insert: "m::Spam::Foo$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        lookup: "Spam::Foo",
                        detail: "m::Spam::Foo",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: Some(
                                Exact,
                            ),
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: false,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                ]
            "#]],
        )
    }

    #[test]
    fn sets_deprecated_flag_in_items() {
        check(
            r#"
#[deprecated]
fn something_deprecated() {}

fn main() { som$0 }
"#,
            SymbolKind::Function,
            expect![[r#"
                [
                    CompletionItem {
                        label: "main()",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 56..59,
                        delete: 56..59,
                        insert: "main();$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "main",
                        detail: "fn()",
                    },
                    CompletionItem {
                        label: "something_deprecated()",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 56..59,
                        delete: 56..59,
                        insert: "something_deprecated();$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "something_deprecated",
                        detail: "fn()",
                        deprecated: true,
                    },
                ]
            "#]],
        );

        check(
            r#"
struct A { #[deprecated] the_field: u32 }
fn foo() { A { the$0 } }
"#,
            SymbolKind::Field,
            expect![[r#"
                [
                    CompletionItem {
                        label: "the_field",
                        detail_left: None,
                        detail_right: Some(
                            "u32",
                        ),
                        source_range: 57..60,
                        delete: 57..60,
                        insert: "the_field",
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "u32",
                        deprecated: true,
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: Some(
                                CouldUnify,
                            ),
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: None,
                            is_skipping_completion: false,
                        },
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn renders_docs() {
        check_kinds(
            r#"
struct S {
    /// Field docs
    foo:
}
impl S {
    /// Method docs
    fn bar(self) { self.$0 }
}"#,
            &[
                CompletionItemKind::SymbolKind(SymbolKind::Method),
                CompletionItemKind::SymbolKind(SymbolKind::Field),
            ],
            expect![[r#"
                [
                    CompletionItem {
                        label: "bar()",
                        detail_left: None,
                        detail_right: Some(
                            "fn(self)",
                        ),
                        source_range: 94..94,
                        delete: 94..94,
                        insert: "bar();$0",
                        kind: SymbolKind(
                            Method,
                        ),
                        lookup: "bar",
                        detail: "fn(self)",
                        documentation: Documentation(
                            "Method docs",
                        ),
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: true,
                                    return_type: Other,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                    },
                    CompletionItem {
                        label: "foo",
                        detail_left: None,
                        detail_right: Some(
                            "{unknown}",
                        ),
                        source_range: 94..94,
                        delete: 94..94,
                        insert: "foo",
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "{unknown}",
                        documentation: Documentation(
                            "Field docs",
                        ),
                    },
                ]
            "#]],
        );

        check_kinds(
            r#"
use self::my$0;

/// mod docs
mod my { }

/// enum docs
enum E {
    /// variant docs
    V
}
use self::E::*;
"#,
            &[
                CompletionItemKind::SymbolKind(SymbolKind::Module),
                CompletionItemKind::SymbolKind(SymbolKind::Variant),
                CompletionItemKind::SymbolKind(SymbolKind::Enum),
            ],
            expect![[r#"
                [
                    CompletionItem {
                        label: "my",
                        detail_left: None,
                        detail_right: None,
                        source_range: 10..12,
                        delete: 10..12,
                        insert: "my",
                        kind: SymbolKind(
                            Module,
                        ),
                        documentation: Documentation(
                            "mod docs",
                        ),
                    },
                    CompletionItem {
                        label: "V",
                        detail_left: None,
                        detail_right: Some(
                            "V",
                        ),
                        source_range: 10..12,
                        delete: 10..12,
                        insert: "V$0",
                        kind: SymbolKind(
                            Variant,
                        ),
                        detail: "V",
                        documentation: Documentation(
                            "variant docs",
                        ),
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: false,
                                    has_self_param: false,
                                    return_type: DirectConstructor,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        trigger_call_info: true,
                    },
                    CompletionItem {
                        label: "E",
                        detail_left: None,
                        detail_right: Some(
                            "E",
                        ),
                        source_range: 10..12,
                        delete: 10..12,
                        insert: "E",
                        kind: SymbolKind(
                            Enum,
                        ),
                        detail: "E",
                        documentation: Documentation(
                            "enum docs",
                        ),
                    },
                ]
            "#]],
        )
    }

    #[test]
    fn dont_render_attrs() {
        check(
            r#"
struct S;
impl S {
    #[inline]
    fn the_method(&self) { }
}
fn foo(s: S) { s.$0 }
"#,
            CompletionItemKind::SymbolKind(SymbolKind::Method),
            expect![[r#"
                [
                    CompletionItem {
                        label: "the_method()",
                        detail_left: None,
                        detail_right: Some(
                            "fn(&self)",
                        ),
                        source_range: 81..81,
                        delete: 81..81,
                        insert: "the_method();$0",
                        kind: SymbolKind(
                            Method,
                        ),
                        lookup: "the_method",
                        detail: "fn(&self)",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: true,
                                    return_type: Other,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                    },
                ]
            "#]],
        )
    }

    #[test]
    fn no_call_parens_if_fn_ptr_needed() {
        cov_mark::check!(no_call_parens_if_fn_ptr_needed);
        check_edit(
            "foo",
            r#"
fn foo(foo: u8, bar: u8) {}
struct ManualVtable { f: fn(u8, u8) }

fn main() -> ManualVtable {
    ManualVtable { f: f$0 }
}
"#,
            r#"
fn foo(foo: u8, bar: u8) {}
struct ManualVtable { f: fn(u8, u8) }

fn main() -> ManualVtable {
    ManualVtable { f: foo }
}
"#,
        );
        check_edit(
            "type",
            r#"
struct RawIdentTable { r#type: u32 }

fn main() -> RawIdentTable {
    RawIdentTable { t$0: 42 }
}
"#,
            r#"
struct RawIdentTable { r#type: u32 }

fn main() -> RawIdentTable {
    RawIdentTable { r#type: 42 }
}
"#,
        );
    }

    #[test]
    fn no_parens_in_use_item() {
        check_edit(
            "foo",
            r#"
mod m { pub fn foo() {} }
use crate::m::f$0;
"#,
            r#"
mod m { pub fn foo() {} }
use crate::m::foo;
"#,
        );
    }

    #[test]
    fn no_parens_in_call() {
        check_edit(
            "foo",
            r#"
fn foo(x: i32) {}
fn main() { f$0(); }
"#,
            r#"
fn foo(x: i32) {}
fn main() { foo(); }
"#,
        );
        check_edit(
            "foo",
            r#"
struct Foo;
impl Foo { fn foo(&self){} }
fn f(foo: &Foo) { foo.f$0(); }
"#,
            r#"
struct Foo;
impl Foo { fn foo(&self){} }
fn f(foo: &Foo) { foo.foo(); }
"#,
        );
    }

    #[test]
    fn inserts_angle_brackets_for_generics() {
        cov_mark::check!(inserts_angle_brackets_for_generics);
        check_edit(
            "Vec",
            r#"
struct Vec<T> {}
fn foo(xs: Ve$0)
"#,
            r#"
struct Vec<T> {}
fn foo(xs: Vec<$0>)
"#,
        );
        check_edit(
            "Vec",
            r#"
type Vec<T> = (T,);
fn foo(xs: Ve$0)
"#,
            r#"
type Vec<T> = (T,);
fn foo(xs: Vec<$0>)
"#,
        );
        check_edit(
            "Vec",
            r#"
struct Vec<T = i128> {}
fn foo(xs: Ve$0)
"#,
            r#"
struct Vec<T = i128> {}
fn foo(xs: Vec)
"#,
        );
        check_edit(
            "Vec",
            r#"
struct Vec<T> {}
fn foo(xs: Ve$0<i128>)
"#,
            r#"
struct Vec<T> {}
fn foo(xs: Vec<i128>)
"#,
        );
    }

    #[test]
    fn active_param_relevance() {
        check_relevance(
            r#"
struct S { foo: i64, bar: u32, baz: u32 }
fn test(bar: u32) { }
fn foo(s: S) { test(s.$0) }
"#,
            expect![[r#"
                fd bar u32 [type+name]
                fd baz u32 [type]
                fd foo i64 []
            "#]],
        );
    }

    #[test]
    fn record_field_relevances() {
        check_relevance(
            r#"
struct A { foo: i64, bar: u32, baz: u32 }
struct B { x: (), y: f32, bar: u32 }
fn foo(a: A) { B { bar: a.$0 }; }
"#,
            expect![[r#"
                fd bar u32 [type+name]
                fd baz u32 [type]
                fd foo i64 []
            "#]],
        )
    }

    #[test]
    fn tuple_field_detail() {
        check(
            r#"
struct S(i32);

fn f() -> i32 {
    let s = S(0);
    s.0$0
}
"#,
            SymbolKind::Field,
            expect![[r#"
                [
                    CompletionItem {
                        label: "0",
                        detail_left: None,
                        detail_right: Some(
                            "i32",
                        ),
                        source_range: 56..57,
                        delete: 56..57,
                        insert: "0",
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "i32",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: Some(
                                Exact,
                            ),
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: None,
                            is_skipping_completion: false,
                        },
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn record_field_and_call_relevances() {
        check_relevance(
            r#"
struct A { foo: i64, bar: u32, baz: u32 }
struct B { x: (), y: f32, bar: u32 }
fn f(foo: i64) {  }
fn foo(a: A) { B { bar: f(a.$0) }; }
"#,
            expect![[r#"
                fd foo i64 [type+name]
                fd bar u32 []
                fd baz u32 []
            "#]],
        );
        check_relevance(
            r#"
struct A { foo: i64, bar: u32, baz: u32 }
struct B { x: (), y: f32, bar: u32 }
fn f(foo: i64) {  }
fn foo(a: A) { f(B { bar: a.$0 }); }
"#,
            expect![[r#"
                fd bar u32 [type+name]
                fd baz u32 [type]
                fd foo i64 []
            "#]],
        );
    }

    #[test]
    fn prioritize_exact_ref_match() {
        check_relevance(
            r#"
struct WorldSnapshot { _f: () };
fn go(world: &WorldSnapshot) { go(w$0) }
"#,
            expect![[r#"
                lc world &WorldSnapshot [type+name+local]
                ex world  [type]
                st WorldSnapshot {…} WorldSnapshot { _f: () } []
                st &WorldSnapshot {…} [type]
                st WorldSnapshot WorldSnapshot []
                st &WorldSnapshot [type]
                fn go(…) fn(&WorldSnapshot) []
            "#]],
        );
    }

    #[test]
    fn too_many_arguments() {
        cov_mark::check!(too_many_arguments);
        check_relevance(
            r#"
struct Foo;
fn f(foo: &Foo) { f(foo, w$0) }
"#,
            expect![[r#"
                lc foo &Foo [local]
                st Foo Foo []
                fn f(…) fn(&Foo) []
            "#]],
        );
    }

    #[test]
    fn score_fn_type_and_name_match() {
        check_relevance(
            r#"
struct A { bar: u8 }
fn baz() -> u8 { 0 }
fn bar() -> u8 { 0 }
fn f() { A { bar: b$0 }; }
"#,
            expect![[r#"
                fn bar() fn() -> u8 [type+name]
                ex bar()  [type]
                fn baz() fn() -> u8 [type]
                ex baz()  [type]
                st A A []
                fn f() fn() []
            "#]],
        );
    }

    #[test]
    fn score_method_type_and_name_match() {
        check_relevance(
            r#"
fn baz(aaa: u32){}
struct Foo;
impl Foo {
fn aaa(&self) -> u32 { 0 }
fn bbb(&self) -> u32 { 0 }
fn ccc(&self) -> u64 { 0 }
}
fn f() {
    baz(Foo.$0
}
"#,
            expect![[r#"
                me aaa() fn(&self) -> u32 [type+name]
                me bbb() fn(&self) -> u32 [type]
                me ccc() fn(&self) -> u64 []
            "#]],
        );
    }

    #[test]
    fn score_method_name_match_only() {
        check_relevance(
            r#"
fn baz(aaa: u32){}
struct Foo;
impl Foo {
fn aaa(&self) -> u64 { 0 }
}
fn f() {
    baz(Foo.$0
}
"#,
            expect![[r#"
                me aaa() fn(&self) -> u64 [name]
            "#]],
        );
    }

    #[test]
    fn test_avoid_redundant_suggestion() {
        check_relevance(
            r#"
struct aa([u8]);

impl aa {
    fn from_bytes(bytes: &[u8]) -> &Self {
        unsafe { &*(bytes as *const [u8] as *const aa) }
    }
}

fn bb()-> &'static aa {
    let bytes = b"hello";
    aa::$0
}
"#,
            expect![[r#"
                ex bb()  [type]
                fn from_bytes(…) fn(&[u8]) -> &aa [type_could_unify]
            "#]],
        );
    }

    #[test]
    fn suggest_ref_mut() {
        cov_mark::check!(suggest_ref);
        check_relevance(
            r#"
struct S;
fn foo(s: &mut S) {}
fn main() {
    let mut s = S;
    foo($0);
}
            "#,
            expect![[r#"
                lc s S [name+local]
                lc &mut s [type+name+local]
                st S S []
                st &mut S [type]
                st S S []
                st &mut S [type]
                fn foo(…) fn(&mut S) []
                fn main() fn() []
            "#]],
        );
        check_relevance(
            r#"
struct S;
fn foo(s: &mut S) {}
fn main() {
    let mut s = S;
    foo(&mut $0);
}
            "#,
            expect![[r#"
                lc s S [type+name+local]
                st S S [type]
                st S S [type]
                ex S  [type]
                ex s  [type]
                fn foo(…) fn(&mut S) []
                fn main() fn() []
            "#]],
        );
        check_relevance(
            r#"
struct S;
fn foo(s: &mut S) {}
fn main() {
    let mut ssss = S;
    foo(&mut s$0);
}
            "#,
            expect![[r#"
                st S S [type]
                lc ssss S [type+local]
                st S S [type]
                ex S  [type]
                ex ssss  [type]
                fn foo(…) fn(&mut S) []
                fn main() fn() []
            "#]],
        );
    }

    #[test]
    fn suggest_deref_copy() {
        cov_mark::check!(suggest_deref);
        check_relevance(
            r#"
//- minicore: copy
struct Foo;

impl Copy for Foo {}
impl Clone for Foo {
    fn clone(&self) -> Self { *self }
}

fn bar(x: Foo) {}

fn main() {
    let foo = &Foo;
    bar($0);
}
"#,
            expect![[r#"
                st Foo Foo [type]
                st Foo Foo [type]
                ex Foo  [type]
                lc foo &Foo [local]
                lc *foo [type+local]
                tt Clone  []
                tt Copy  []
                fn bar(…) fn(Foo) []
                md core  []
                fn main() fn() []
            "#]],
        );
    }

    #[test]
    fn suggest_deref_trait() {
        check_relevance(
            r#"
//- minicore: deref
struct S;
struct T(S);

impl core::ops::Deref for T {
    type Target = S;

    fn deref(&self) -> &Self::Target {
        &self.0
    }
}

fn foo(s: &S) {}

fn main() {
    let t = T(S);
    let m = 123;

    foo($0);
}
            "#,
            expect![[r#"
                st S S []
                st &S [type]
                ex core::ops::Deref::deref(&t)  [type_could_unify]
                lc m i32 [local]
                lc t T [local]
                lc &t [type+local]
                st S S []
                st &S [type]
                st T T []
                st &T [type]
                md core  []
                fn foo(…) fn(&S) []
                fn main() fn() []
            "#]],
        )
    }

    #[test]
    fn suggest_deref_mut() {
        check_relevance(
            r#"
//- minicore: deref_mut
struct S;
struct T(S);

impl core::ops::Deref for T {
    type Target = S;

    fn deref(&self) -> &Self::Target {
        &self.0
    }
}

impl core::ops::DerefMut for T {
    fn deref_mut(&mut self) -> &mut Self::Target {
        &mut self.0
    }
}

fn foo(s: &mut S) {}

fn main() {
    let t = T(S);
    let m = 123;

    foo($0);
}
            "#,
            expect![[r#"
                st S S []
                st &mut S [type]
                ex core::ops::DerefMut::deref_mut(&mut t)  [type_could_unify]
                lc m i32 [local]
                lc t T [local]
                lc &mut t [type+local]
                st S S []
                st &mut S [type]
                st T T []
                st &mut T [type]
                md core  []
                fn foo(…) fn(&mut S) []
                fn main() fn() []
            "#]],
        )
    }

    #[test]
    fn locals() {
        check_relevance(
            r#"
fn foo(bar: u32) {
    let baz = 0;

    f$0
}
"#,
            expect![[r#"
                lc bar u32 [local]
                lc baz i32 [local]
                fn foo(…) fn(u32) []
            "#]],
        );
    }

    #[test]
    fn enum_owned() {
        check_relevance(
            r#"
enum Foo { A, B }
fn foo() {
    bar($0);
}
fn bar(t: Foo) {}
"#,
            expect![[r#"
                ev Foo::A Foo::A [type]
                ev Foo::B Foo::B [type]
                en Foo Foo [type]
                ex Foo::A  [type]
                ex Foo::B  [type]
                fn bar(…) fn(Foo) []
                fn foo() fn() []
            "#]],
        );
    }

    #[test]
    fn enum_ref() {
        check_relevance(
            r#"
enum Foo { A, B }
fn foo() {
    bar($0);
}
fn bar(t: &Foo) {}
"#,
            expect![[r#"
                ev Foo::A Foo::A []
                ev &Foo::A [type]
                ev Foo::B Foo::B []
                ev &Foo::B [type]
                en Foo Foo []
                en &Foo [type]
                fn bar(…) fn(&Foo) []
                fn foo() fn() []
            "#]],
        );
    }

    #[test]
    fn suggest_deref_fn_ret() {
        check_relevance(
            r#"
//- minicore: deref
struct S;
struct T(S);

impl core::ops::Deref for T {
    type Target = S;

    fn deref(&self) -> &Self::Target {
        &self.0
    }
}

fn foo(s: &S) {}
fn bar() -> T {}

fn main() {
    foo($0);
}
"#,
            expect![[r#"
                st S S []
                st &S [type]
                ex core::ops::Deref::deref(&bar())  [type_could_unify]
                st S S []
                st &S [type]
                st T T []
                st &T [type]
                fn bar() fn() -> T []
                fn &bar() [type]
                md core  []
                fn foo(…) fn(&S) []
                fn main() fn() []
            "#]],
        )
    }

    #[test]
    fn op_function_relevances() {
        check_relevance(
            r#"
#[lang = "sub"]
trait Sub {
    fn sub(self, other: Self) -> Self { self }
}
impl Sub for u32 {}
fn foo(a: u32) { a.$0 }
"#,
            expect![[r#"
                me sub(…) fn(self, Self) -> Self [op_method]
            "#]],
        );
        check_relevance(
            r#"
struct Foo;
impl Foo {
    fn new() -> Self {}
}
#[lang = "eq"]
pub trait PartialEq<Rhs: ?Sized = Self> {
    fn eq(&self, other: &Rhs) -> bool;
    fn ne(&self, other: &Rhs) -> bool;
}

impl PartialEq for Foo {}
fn main() {
    Foo::$0
}
"#,
            expect![[r#"
                fn new() fn() -> Foo []
                me eq(…) fn(&self, &Rhs) -> bool [op_method]
                me ne(…) fn(&self, &Rhs) -> bool [op_method]
            "#]],
        );
    }

    #[test]
    fn constructor_order_simple() {
        check_relevance(
            r#"
struct Foo;
struct Other;
struct Option<T>(T);

impl Foo {
    fn fn_ctr() -> Foo { unimplemented!() }
    fn fn_another(n: u32) -> Other { unimplemented!() }
    fn fn_ctr_self() -> Option<Self> { unimplemented!() }
}

fn test() {
    let a = Foo::$0;
}
"#,
            expect![[r#"
                fn fn_ctr() fn() -> Foo [type_could_unify]
                fn fn_ctr_self() fn() -> Option<Foo> [type_could_unify]
                fn fn_another(…) fn(u32) -> Other [type_could_unify]
            "#]],
        );
    }

    #[test]
    fn constructor_order_kind() {
        check_function_relevance(
            r#"
struct Foo;
struct Bar;
struct Option<T>(T);
enum Result<T, E> { Ok(T), Err(E) };

impl Foo {
    fn fn_ctr(&self) -> Foo { unimplemented!() }
    fn fn_ctr_with_args(&self, n: u32) -> Foo { unimplemented!() }
    fn fn_another(&self, n: u32) -> Bar { unimplemented!() }
    fn fn_ctr_wrapped(&self, ) -> Option<Self> { unimplemented!() }
    fn fn_ctr_wrapped_2(&self, ) -> Result<Self, Bar> { unimplemented!() }
    fn fn_ctr_wrapped_3(&self, ) -> Result<Bar, Self> { unimplemented!() } // Self is not the first type
    fn fn_ctr_wrapped_with_args(&self, m: u32) -> Option<Self> { unimplemented!() }
    fn fn_another_unit(&self) { unimplemented!() }
}

fn test() {
    let a = self::Foo::$0;
}
"#,
            expect![[r#"
                [
                    (
                        "fn(&self, u32) -> Bar",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Other,
                            },
                        ),
                    ),
                    (
                        "fn(&self)",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Other,
                            },
                        ),
                    ),
                    (
                        "fn(&self) -> Foo",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: DirectConstructor,
                            },
                        ),
                    ),
                    (
                        "fn(&self, u32) -> Foo",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: DirectConstructor,
                            },
                        ),
                    ),
                    (
                        "fn(&self) -> Option<Foo>",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Constructor,
                            },
                        ),
                    ),
                    (
                        "fn(&self) -> Result<Foo, Bar>",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Constructor,
                            },
                        ),
                    ),
                    (
                        "fn(&self) -> Result<Bar, Foo>",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Constructor,
                            },
                        ),
                    ),
                    (
                        "fn(&self, u32) -> Option<Foo>",
                        Some(
                            CompletionRelevanceFn {
                                has_params: true,
                                has_self_param: true,
                                return_type: Constructor,
                            },
                        ),
                    ),
                ]
            "#]],
        );
    }

    #[test]
    fn constructor_order_relevance() {
        check_relevance(
            r#"
struct Foo;
struct FooBuilder;
struct Result<T>(T);

impl Foo {
    fn fn_no_ret(&self) {}
    fn fn_ctr_with_args(input: u32) -> Foo { unimplemented!() }
    fn fn_direct_ctr() -> Self { unimplemented!() }
    fn fn_ctr() -> Result<Self> { unimplemented!() }
    fn fn_other() -> Result<u32> { unimplemented!() }
    fn fn_builder() -> FooBuilder { unimplemented!() }
}

fn test() {
    let a = self::Foo::$0;
}
"#,
            // preference:
            // Direct Constructor
            // Direct Constructor with args
            // Builder
            // Constructor
            // Others
            expect![[r#"
                fn fn_direct_ctr() fn() -> Foo [type_could_unify]
                fn fn_ctr_with_args(…) fn(u32) -> Foo [type_could_unify]
                fn fn_builder() fn() -> FooBuilder [type_could_unify]
                fn fn_ctr() fn() -> Result<Foo> [type_could_unify]
                me fn_no_ret(…) fn(&self) [type_could_unify]
                fn fn_other() fn() -> Result<u32> [type_could_unify]
            "#]],
        );

        //
    }

    #[test]
    fn function_relevance_generic_1() {
        check_relevance(
            r#"
struct Foo<T: Default>(T);
struct FooBuilder;
struct Option<T>(T);
enum Result<T, E>{Ok(T), Err(E)};

impl<T: Default> Foo<T> {
    fn fn_returns_unit(&self) {}
    fn fn_ctr_with_args(input: T) -> Foo<T> { unimplemented!() }
    fn fn_direct_ctr() -> Self { unimplemented!() }
    fn fn_ctr_wrapped() -> Option<Self> { unimplemented!() }
    fn fn_ctr_wrapped_2() -> Result<Self, u32> { unimplemented!() }
    fn fn_other() -> Option<u32> { unimplemented!() }
    fn fn_builder() -> FooBuilder { unimplemented!() }
}

fn test() {
    let a = self::Foo::<u32>::$0;
}
                "#,
            expect![[r#"
                fn fn_direct_ctr() fn() -> Foo<T> [type_could_unify]
                fn fn_ctr_with_args(…) fn(T) -> Foo<T> [type_could_unify]
                fn fn_builder() fn() -> FooBuilder [type_could_unify]
                fn fn_ctr_wrapped() fn() -> Option<Foo<T>> [type_could_unify]
                fn fn_ctr_wrapped_2() fn() -> Result<Foo<T>, u32> [type_could_unify]
                fn fn_other() fn() -> Option<u32> [type_could_unify]
                me fn_returns_unit(…) fn(&self) [type_could_unify]
            "#]],
        );
    }

    #[test]
    fn function_relevance_generic_2() {
        // Generic 2
        check_relevance(
            r#"
struct Foo<T: Default>(T);
struct FooBuilder;
struct Option<T>(T);
enum Result<T, E>{Ok(T), Err(E)};

impl<T: Default> Foo<T> {
    fn fn_no_ret(&self) {}
    fn fn_ctr_with_args(input: T) -> Foo<T> { unimplemented!() }
    fn fn_direct_ctr() -> Self { unimplemented!() }
    fn fn_ctr() -> Option<Self> { unimplemented!() }
    fn fn_ctr2() -> Result<Self, u32> { unimplemented!() }
    fn fn_other() -> Option<u32> { unimplemented!() }
    fn fn_builder() -> FooBuilder { unimplemented!() }
}

fn test() {
    let a : Res<Foo<u32>> = Foo::$0;
}
                "#,
            expect![[r#"
                fn fn_direct_ctr() fn() -> Foo<T> [type_could_unify]
                fn fn_ctr_with_args(…) fn(T) -> Foo<T> [type_could_unify]
                fn fn_builder() fn() -> FooBuilder [type_could_unify]
                fn fn_ctr() fn() -> Option<Foo<T>> [type_could_unify]
                fn fn_ctr2() fn() -> Result<Foo<T>, u32> [type_could_unify]
                me fn_no_ret(…) fn(&self) [type_could_unify]
                fn fn_other() fn() -> Option<u32> [type_could_unify]
            "#]],
        );
    }

    #[test]
    fn struct_field_method_ref() {
        check_kinds(
            r#"
struct Foo { bar: u32, qux: fn() }
impl Foo { fn baz(&self) -> u32 { 0 } }

fn foo(f: Foo) { let _: &u32 = f.b$0 }
"#,
            &[
                CompletionItemKind::SymbolKind(SymbolKind::Method),
                CompletionItemKind::SymbolKind(SymbolKind::Field),
            ],
            expect![[r#"
                [
                    CompletionItem {
                        label: "baz()",
                        detail_left: None,
                        detail_right: Some(
                            "fn(&self) -> u32",
                        ),
                        source_range: 109..110,
                        delete: 109..110,
                        insert: "baz()$0",
                        kind: SymbolKind(
                            Method,
                        ),
                        lookup: "baz",
                        detail: "fn(&self) -> u32",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: true,
                                    has_self_param: true,
                                    return_type: Other,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        ref_match: "&@107",
                    },
                    CompletionItem {
                        label: "bar",
                        detail_left: None,
                        detail_right: Some(
                            "u32",
                        ),
                        source_range: 109..110,
                        delete: 109..110,
                        insert: "bar",
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "u32",
                        ref_match: "&@107",
                    },
                    CompletionItem {
                        label: "qux",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 109..110,
                        text_edit: TextEdit {
                            indels: [
                                Indel {
                                    insert: "(",
                                    delete: 107..107,
                                },
                                Indel {
                                    insert: "qux)()",
                                    delete: 109..110,
                                },
                            ],
                            annotation: None,
                        },
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "fn()",
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn expected_fn_type_ref() {
        check_kinds(
            r#"
struct S { field: fn() }

fn foo() {
    let foo: fn() = S { fields: || {}}.fi$0;
}
"#,
            &[CompletionItemKind::SymbolKind(SymbolKind::Field)],
            expect![[r#"
                [
                    CompletionItem {
                        label: "field",
                        detail_left: None,
                        detail_right: Some(
                            "fn()",
                        ),
                        source_range: 76..78,
                        delete: 76..78,
                        insert: "field",
                        kind: SymbolKind(
                            Field,
                        ),
                        detail: "fn()",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: Some(
                                Exact,
                            ),
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: None,
                            is_skipping_completion: false,
                        },
                    },
                ]
            "#]],
        )
    }

    #[test]
    fn qualified_path_ref() {
        check_kinds(
            r#"
struct S;

struct T;
impl T {
    fn foo() -> S {}
}

fn bar(s: &S) {}

fn main() {
    bar(T::$0);
}
"#,
            &[CompletionItemKind::SymbolKind(SymbolKind::Function)],
            expect![[r#"
                [
                    CompletionItem {
                        label: "foo()",
                        detail_left: None,
                        detail_right: Some(
                            "fn() -> S",
                        ),
                        source_range: 95..95,
                        delete: 95..95,
                        insert: "foo()$0",
                        kind: SymbolKind(
                            Function,
                        ),
                        lookup: "foo",
                        detail: "fn() -> S",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: None,
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: Some(
                                CompletionRelevanceFn {
                                    has_params: false,
                                    has_self_param: false,
                                    return_type: Other,
                                },
                            ),
                            is_skipping_completion: false,
                        },
                        ref_match: "&@92",
                    },
                ]
            "#]],
        );
    }

    #[test]
    fn generic_enum() {
        check_relevance(
            r#"
enum Foo<T> { A(T), B }
// bar() should not be an exact type match
// because the generic parameters are different
fn bar() -> Foo<u8> { Foo::B }
// FIXME baz() should be an exact type match
// because the types could unify, but it currently
// is not. This is due to the T here being
// TyKind::Placeholder rather than TyKind::Missing.
fn baz<T>() -> Foo<T> { Foo::B }
fn foo() {
    let foo: Foo<u32> = Foo::B;
    let _: Foo<u32> = f$0;
}
"#,
            expect![[r#"
                ev Foo::B Foo::B [type_could_unify]
                ev Foo::A(…) Foo::A(T) [type_could_unify]
                lc foo Foo<u32> [type+local]
                ex Foo::B  [type]
                ex foo  [type]
                en Foo Foo<{unknown}> [type_could_unify]
                fn bar() fn() -> Foo<u8> []
                fn baz() fn() -> Foo<T> []
                fn foo() fn() []
            "#]],
        );
    }

    #[test]
    fn postfix_exact_match_is_high_priority() {
        cov_mark::check!(postfix_exact_match_is_high_priority);
        check_relevance_for_kinds(
            r#"
mod ops {
    pub trait Not {
        type Output;
        fn not(self) -> Self::Output;
    }

    impl Not for bool {
        type Output = bool;
        fn not(self) -> bool { if self { false } else { true }}
    }
}

fn main() {
    let _: bool = (9 > 2).not$0;
}
    "#,
            &[CompletionItemKind::Snippet, CompletionItemKind::SymbolKind(SymbolKind::Method)],
            expect![[r#"
                sn not !expr [snippet]
                sn box Box::new(expr) []
                sn call function(expr) []
                sn const const {} []
                sn dbg dbg!(expr) []
                sn dbgr dbg!(&expr) []
                sn deref *expr []
                sn if if expr {} []
                sn match match expr {} []
                sn ref &expr []
                sn refm &mut expr []
                sn return return expr []
                sn unsafe unsafe {} []
                sn while while expr {} []
                me not() fn(self) -> <Self as Not>::Output [requires_import]
            "#]],
        );
    }

    #[test]
    fn postfix_inexact_match_is_low_priority() {
        cov_mark::check!(postfix_inexact_match_is_low_priority);
        check_relevance_for_kinds(
            r#"
struct S;
impl S {
    fn f(&self) {}
}
fn main() {
    S.$0
}
    "#,
            &[CompletionItemKind::Snippet, CompletionItemKind::SymbolKind(SymbolKind::Method)],
            expect![[r#"
                me f() fn(&self) []
                sn box Box::new(expr) []
                sn call function(expr) []
                sn const const {} []
                sn dbg dbg!(expr) []
                sn dbgr dbg!(&expr) []
                sn deref *expr []
                sn let let []
                sn letm let mut []
                sn match match expr {} []
                sn ref &expr []
                sn refm &mut expr []
                sn return return expr []
                sn unsafe unsafe {} []
            "#]],
        );
    }

    #[test]
    fn flyimport_reduced_relevance() {
        check_relevance(
            r#"
mod std {
    pub mod io {
        pub trait BufRead {}
        pub struct BufReader;
        pub struct BufWriter;
    }
}
struct Buffer;

fn f() {
    Buf$0
}
"#,
            expect![[r#"
                st Buffer Buffer []
                fn f() fn() []
                md std  []
                tt BufRead  [requires_import]
                st BufReader BufReader [requires_import]
                st BufWriter BufWriter [requires_import]
            "#]],
        );
    }

    #[test]
    fn completes_struct_with_raw_identifier() {
        check_edit(
            "type",
            r#"
mod m { pub struct r#type {} }
fn main() {
    let r#type = m::t$0;
}
"#,
            r#"
mod m { pub struct r#type {} }
fn main() {
    let r#type = m::r#type;
}
"#,
        )
    }

    #[test]
    fn completes_fn_with_raw_identifier() {
        check_edit(
            "type",
            r#"
mod m { pub fn r#type {} }
fn main() {
    m::t$0
}
"#,
            r#"
mod m { pub fn r#type {} }
fn main() {
    m::r#type();$0
}
"#,
        )
    }

    #[test]
    fn completes_macro_with_raw_identifier() {
        check_edit(
            "let!",
            r#"
macro_rules! r#let { () => {} }
fn main() {
    $0
}
"#,
            r#"
macro_rules! r#let { () => {} }
fn main() {
    r#let!($0)
}
"#,
        )
    }

    #[test]
    fn completes_variant_with_raw_identifier() {
        check_edit(
            "type",
            r#"
enum A { r#type }
fn main() {
    let a = A::t$0
}
"#,
            r#"
enum A { r#type }
fn main() {
    let a = A::r#type$0
}
"#,
        )
    }

    #[test]
    fn completes_field_with_raw_identifier() {
        check_edit(
            "fn",
            r#"
mod r#type {
    pub struct r#struct {
        pub r#fn: u32
    }
}

fn main() {
    let a = r#type::r#struct {};
    a.$0
}
"#,
            r#"
mod r#type {
    pub struct r#struct {
        pub r#fn: u32
    }
}

fn main() {
    let a = r#type::r#struct {};
    a.r#fn
}
"#,
        )
    }

    #[test]
    fn completes_const_with_raw_identifier() {
        check_edit(
            "type",
            r#"
struct r#struct {}
impl r#struct { pub const r#type: u8 = 1; }
fn main() {
    r#struct::t$0
}
"#,
            r#"
struct r#struct {}
impl r#struct { pub const r#type: u8 = 1; }
fn main() {
    r#struct::r#type
}
"#,
        )
    }

    #[test]
    fn completes_type_alias_with_raw_identifier() {
        check_edit(
            "type type",
            r#"
struct r#struct {}
trait r#trait { type r#type; }
impl r#trait for r#struct { type t$0 }
"#,
            r#"
struct r#struct {}
trait r#trait { type r#type; }
impl r#trait for r#struct { type r#type = $0; }
"#,
        )
    }

    #[test]
    fn field_access_includes_self() {
        check_edit(
            "length",
            r#"
struct S {
    length: i32
}

impl S {
    fn some_fn(&self) {
        let l = len$0
    }
}
"#,
            r#"
struct S {
    length: i32
}

impl S {
    fn some_fn(&self) {
        let l = self.length
    }
}
"#,
        )
    }

    #[test]
    fn notable_traits_method_relevance() {
        check_kinds(
            r#"
#[doc(notable_trait)]
trait Write {
    fn write(&self);
    fn flush(&self);
}

struct Writer;

impl Write for Writer {
    fn write(&self) {}
    fn flush(&self) {}
}

fn main() {
    Writer.$0
}
"#,
            &[
                CompletionItemKind::SymbolKind(SymbolKind::Method),
                CompletionItemKind::SymbolKind(SymbolKind::Field),
                CompletionItemKind::SymbolKind(SymbolKind::Function),
            ],
            expect![[r#"
                [
                    CompletionItem {
                        label: "flush()",
                        detail_left: Some(
                            "(as Write)",
                        ),
                        detail_right: Some(
                            "fn(&self)",
                        ),
                        source_range: 193..193,
                        delete: 193..193,
                        insert: "flush();$0",
                        kind: SymbolKind(
                            Method,
                        ),
                        lookup: "flush",
                        detail: "fn(&self)",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: Some(
                                CompletionRelevanceTraitInfo {
                                    notable_trait: true,
                                    is_op_method: false,
                                },
                            ),
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: None,
                            is_skipping_completion: false,
                        },
                    },
                    CompletionItem {
                        label: "write()",
                        detail_left: Some(
                            "(as Write)",
                        ),
                        detail_right: Some(
                            "fn(&self)",
                        ),
                        source_range: 193..193,
                        delete: 193..193,
                        insert: "write();$0",
                        kind: SymbolKind(
                            Method,
                        ),
                        lookup: "write",
                        detail: "fn(&self)",
                        relevance: CompletionRelevance {
                            exact_name_match: false,
                            type_match: None,
                            is_local: false,
                            trait_: Some(
                                CompletionRelevanceTraitInfo {
                                    notable_trait: true,
                                    is_op_method: false,
                                },
                            ),
                            is_name_already_imported: false,
                            requires_import: false,
                            is_private_editable: false,
                            postfix_match: None,
                            function: None,
                            is_skipping_completion: false,
                        },
                    },
                ]
            "#]],
        );
    }
}
'n6206' href='#n6206'>6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318 6319 6320 6321 6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338 6339 6340 6341 6342 6343 6344 6345 6346 6347 6348 6349 6350 6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361 6362 6363 6364 6365 6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379 6380 6381 6382 6383 6384 6385 6386 6387 6388 6389 6390 6391 6392 6393 6394 6395 6396 6397 6398 6399 6400 6401 6402 6403 6404 6405 6406 6407 6408 6409 6410 6411 6412 6413 6414 6415 6416 6417 6418 6419 6420 6421 6422 6423 6424 6425 6426 6427 6428 6429 6430 6431 6432 6433 6434 6435 6436 6437 6438 6439 6440 6441 6442 6443 6444 6445 6446 6447 6448 6449 6450 6451 6452 6453 6454 6455 6456 6457 6458 6459 6460 6461 6462 6463 6464 6465 6466 6467 6468 6469 6470 6471 6472 6473 6474 6475 6476 6477 6478 6479 6480 6481 6482 6483 6484 6485 6486 6487 6488 6489 6490 6491 6492 6493 6494 6495 6496 6497 6498 6499 6500 6501 6502 6503 6504 6505 6506 6507 6508 6509 6510 6511 6512 6513 6514 6515 6516 6517 6518 6519 6520 6521 6522 6523 6524 6525 6526 6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537 6538 6539 6540 6541 6542 6543 6544 6545 6546 6547 6548 6549 6550 6551 6552 6553 6554 6555 6556 6557 6558 6559 6560 6561 6562 6563 6564 6565 6566 6567 6568 6569 6570 6571 6572 6573 6574 6575 6576 6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597 6598 6599 6600 6601 6602 6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622 6623 6624 6625 6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648 6649 6650 6651 6652 6653 6654 6655 6656 6657 6658 6659 6660 6661 6662 6663 6664 6665 6666 6667 6668 6669 6670 6671 6672 6673 6674 6675 6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689 6690 6691 6692 6693 6694 6695 6696 6697 6698 6699 6700 6701 6702 6703 6704 6705 6706 6707 6708 6709 6710 6711 6712 6713 6714 6715 6716 6717 6718 6719 6720 6721 6722 6723 6724 6725 6726 6727 6728 6729 6730 6731 6732 6733 6734 6735 6736 6737 6738 6739 6740 6741 6742 6743 6744 6745 6746 6747 6748 6749 6750 6751 6752 6753 6754 6755 6756 6757 6758 6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769 6770 6771 6772 6773 6774 6775 6776 6777 6778 6779 6780 6781 6782 6783 6784 6785 6786 6787 6788 6789 6790 6791 6792 6793 6794 6795 6796 6797 6798 6799 6800 6801 6802 6803 6804 6805 6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816 6817 6818 6819 6820 6821 6822 6823 6824 6825 6826 6827 6828 6829 6830 6831 6832 6833 6834 6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845 6846 6847 6848 6849 6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938 6939 6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990 6991 6992 6993 6994 6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011 7012 7013 7014 7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036 7037 7038 7039 7040 7041 7042 7043 7044 7045 7046 7047 7048 7049 7050 7051 7052 7053 7054 7055 7056 7057 7058 7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079 7080 7081 7082 7083 7084 7085 7086 7087 7088 7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128 7129 7130 7131 7132 7133 7134 7135 7136 7137 7138 7139 7140 7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167 7168 7169 7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200 7201 7202 7203 7204 7205 7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227 7228 7229 7230 7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282 7283 7284 7285 7286 7287 7288 7289 7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305 7306 7307 7308 7309 7310 7311 7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334 7335 7336 7337 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367 7368 7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386 7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 7426 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471 7472 7473 7474 7475 7476 7477 7478 7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490 7491 7492 7493 7494 7495 7496 7497 7498 7499 7500 7501 7502 7503 7504 7505 7506 7507 7508 7509 7510 7511 7512 7513 7514 7515 7516 7517 7518 7519 7520 7521 7522 7523 7524 7525 7526 7527 7528 7529 7530 7531 7532 7533 7534 7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546 7547 7548 7549 7550 7551 7552 7553 7554 7555 7556 7557 7558 7559 7560 7561 7562 7563 7564 7565 7566 7567 7568 7569 7570 7571 7572 7573 7574 7575 7576 7577 7578 7579 7580 7581 7582 7583 7584 7585 7586 7587 7588 7589 7590 7591 7592 7593 7594 7595 7596 7597 7598 7599 7600 7601 7602 7603 7604 7605 7606 7607 7608 7609 7610 7611 7612 7613 7614 7615 7616 7617 7618 7619 7620 7621 7622 7623 7624 7625 7626 7627 7628 7629 7630 7631 7632 7633 7634 7635 7636 7637 7638 7639 7640 7641 7642 7643 7644 7645 7646 7647 7648 7649 7650 7651 7652 7653 7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664 7665 7666 7667 7668 7669 7670 7671 7672 7673 7674 7675 7676 7677 7678 7679 7680 7681 7682 7683 7684 7685 7686 7687 7688 7689 7690 7691 7692 7693 7694 7695 7696 7697 7698 7699 7700 7701 7702 7703 7704 7705 7706 7707 7708 7709 7710 7711 7712 7713 7714 7715 7716 7717 7718 7719 7720 7721 7722 7723 7724 7725 7726 7727 7728 7729 7730 7731 7732 7733 7734 7735 7736 7737 7738 7739 7740 7741 7742 7743 7744 7745 7746 7747 7748 7749 7750 7751 7752 7753 7754 7755 7756 7757 7758 7759 7760 7761 7762 7763 7764 7765 7766 7767 7768 7769 7770 7771 7772 7773 7774 7775 7776 7777 7778 7779 7780 7781 7782 7783 7784 7785 7786 7787 7788 7789 7790 7791 7792 7793 7794 7795 7796 7797 7798 7799 7800 7801 7802 7803 7804 7805 7806 7807 7808 7809 7810 7811 7812 7813 7814 7815 7816 7817 7818 7819 7820 7821 7822 7823 7824 7825 7826 7827 7828 7829 7830 7831 7832 7833 7834 7835 7836 7837 7838 7839 7840 7841 7842 7843 7844 7845 7846 7847 7848 7849 7850 7851 7852 7853 7854 7855 7856 7857 7858 7859 7860 7861 7862 7863 7864 7865 7866 7867 7868 7869 7870 7871 7872 7873 7874 7875 7876 7877 7878 7879 7880 7881 7882 7883 7884 7885 7886 7887 7888 7889 7890 7891 7892 7893 7894 7895 7896 7897 7898 7899 7900 7901 7902 7903 7904 7905 7906 7907 7908 7909 7910 7911 7912 7913 7914 7915 7916 7917 7918 7919 7920 7921 7922 7923 7924 7925 7926 7927 7928 7929 7930 7931 7932 7933 7934 7935 7936 7937 7938 7939 7940 7941 7942 7943 7944 7945 7946 7947 7948 7949 7950 7951 7952 7953 7954 7955 7956 7957 7958 7959 7960 7961 7962 7963 7964 7965 7966 7967 7968 7969 7970 7971 7972 7973 7974 7975 7976 7977 7978 7979 7980 7981 7982 7983 7984 7985 7986 7987 7988 7989 7990 7991 7992 7993 7994 7995 7996 7997 7998 7999 8000 8001 8002 8003 8004 8005 8006 8007 8008 8009 8010 8011 8012 8013 8014 8015 8016 8017 8018 8019 8020 8021 8022 8023 8024 8025 8026 8027 8028 8029 8030 8031 8032 8033 8034 8035 8036 8037 8038 8039 8040 8041 8042 8043 8044 8045 8046 8047 8048 8049 8050 8051 8052 8053 8054 8055 8056 8057 8058 8059 8060 8061 8062 8063 8064 8065 8066 8067 8068 8069 8070 8071 8072 8073 8074 8075 8076 8077 8078 8079 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8091 8092 8093 8094 8095 8096 8097 8098 8099 8100 8101 8102 8103 8104 8105 8106 8107 8108 8109 8110 8111 8112 8113 8114 8115 8116 8117 8118 8119 8120 8121 8122 8123 8124 8125 8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145 8146 8147 8148 8149 8150 8151 8152 8153 8154 8155 8156 8157 8158 8159 8160 8161 8162 8163 8164 8165 8166 8167 8168 8169 8170 8171 8172 8173 8174 8175 8176 8177 8178 8179 8180 8181 8182 8183 8184 8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205 8206 8207 8208 8209 8210 8211 8212 8213 8214 8215 8216 8217 8218 8219 8220 8221 8222 8223 8224 8225 8226 8227 8228 8229 8230 8231 8232 8233 8234 8235 8236 8237 8238 8239 8240 8241 8242 8243 8244 8245 8246 8247 8248 8249 8250 8251 8252 8253 8254 8255 8256 8257 8258 8259 8260 8261 8262 8263 8264 8265 8266 8267 8268 8269 8270 8271 8272 8273 8274 8275 8276 8277 8278 8279 8280 8281 8282 8283 8284 8285 8286 8287 8288 8289 8290 8291 8292 8293 8294 8295 8296 8297 8298 8299 8300 8301 8302 8303 8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314 8315 8316 8317 8318 8319 8320 8321 8322 8323 8324 8325 8326 8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343 8344 8345 8346 8347 8348 8349 8350 8351 8352 8353 8354 8355 8356 8357 8358 8359 8360 8361 8362 8363 8364 8365 8366 8367 8368 8369 8370 8371 8372 8373 8374 8375 8376 8377 8378 8379 8380 8381 8382 8383 8384 8385 8386 8387 8388 8389 8390 8391 8392 8393 8394 8395 8396 8397 8398 8399 8400 8401 8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435 8436 8437 8438 8439 8440 8441 8442 8443 8444 8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469 8470 8471 8472 8473 8474 8475 8476 8477 8478 8479 8480 8481 8482 8483 8484 8485 8486 8487 8488 8489 8490 8491 8492 8493 8494 8495 8496 8497 8498 8499 8500 8501 8502 8503 8504 8505 8506 8507 8508 8509 8510 8511 8512 8513 8514 8515 8516 8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568 8569 8570 8571 8572 8573 8574 8575 8576 8577 8578 8579 8580 8581 8582 8583 8584 8585 8586 8587 8588 8589 8590 8591 8592 8593 8594 8595 8596 8597 8598 8599 8600 8601 8602 8603 8604 8605 8606 8607 8608 8609 8610 8611 8612 8613 8614 8615 8616 8617 8618 8619 8620 8621 8622 8623 8624 8625 8626 8627 8628 8629 8630 8631 8632 8633 8634 8635 8636 8637 8638 8639 8640 8641 8642 8643 8644 8645 8646 8647 8648 8649 8650 8651 8652 8653 8654 8655 8656 8657 8658 8659 8660 8661 8662 8663 8664 8665 8666 8667 8668 8669 8670 8671 8672 8673 8674 8675 8676 8677 8678 8679 8680 8681 8682 8683 8684 8685 8686 8687 8688 8689 8690 8691 8692 8693 8694 8695 8696 8697 8698 8699 8700 8701 8702 8703 8704 8705 8706 8707 8708 8709 8710 8711 8712 8713 8714 8715 8716 8717 8718 8719 8720 8721 8722 8723 8724 8725 8726 8727 8728 8729 8730 8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741 8742 8743 8744 8745 8746 8747 8748 8749 8750 8751 8752 8753 8754 8755 8756 8757 8758 8759 8760 8761 8762 8763 8764 8765 8766 8767 8768 8769 8770 8771 8772 8773 8774 8775 8776 8777 8778 8779 8780 8781 8782 8783 8784 8785 8786 8787 8788 8789 8790 8791 8792 8793 8794 8795 8796 8797 8798 8799 8800 8801 8802 8803 8804 8805 8806 8807 8808 8809 8810 8811 8812 8813 8814 8815 8816 8817 8818 8819 8820 8821 8822 8823 8824 8825 8826 8827 8828 8829 8830 8831 8832 8833 8834 8835 8836 8837 8838 8839 8840 8841 8842 8843 8844 8845 8846 8847 8848 8849 8850 8851 8852 8853 8854 8855 8856 8857 8858 8859 8860 8861 8862 8863 8864 8865 8866 8867 8868 8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883 8884 8885 8886 8887 8888 8889 8890 8891 8892 8893 8894 8895 8896 8897 8898 8899 8900 8901 8902 8903 8904 8905 8906 8907 8908 8909 8910 8911 8912 8913 8914 8915 8916 8917 8918 8919 8920 8921 8922 8923 8924 8925 8926 8927 8928 8929 8930 8931 8932 8933 8934 8935 8936 8937 8938 8939 8940 8941 8942 8943 8944 8945 8946 8947 8948 8949 8950 8951 8952 8953 8954 8955 8956 8957 8958 8959 8960 8961 8962 8963 8964 8965 8966 8967 8968 8969 8970 8971 8972 8973 8974 8975 8976 8977 8978 8979 8980 8981 8982 8983 8984 8985 8986 8987 8988 8989 8990 8991 8992 8993 8994 8995 8996 8997 8998 8999 9000 9001 9002 9003 9004 9005 9006 9007 9008 9009 9010 9011 9012 9013 9014 9015 9016 9017 9018 9019 9020 9021 9022 9023 9024 9025 9026 9027 9028 9029 9030 9031 9032 9033 9034 9035 9036 9037 9038 9039 9040 9041 9042 9043 9044 9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090 9091 9092 9093 9094 9095 9096 9097 9098 9099 9100 9101 9102 9103 9104 9105 9106 9107 9108 9109 9110 9111 9112 9113 9114 9115 9116 9117 9118 9119 9120 9121 9122 9123 9124 9125 9126 9127 9128 9129 9130 9131 9132 9133 9134 9135 9136 9137 9138 9139 9140 9141 9142 9143 9144 9145 9146 9147 9148 9149 9150 9151 9152 9153 9154 9155 9156 9157 9158 9159 9160 9161 9162 9163 9164 9165 9166 9167 9168 9169 9170 9171 9172 9173 9174 9175 9176 9177 9178 9179 9180 9181 9182 9183 9184 9185 9186 9187 9188 9189 9190 9191 9192 9193 9194 9195 9196 9197 9198 9199 9200 9201 9202 9203 9204 9205 9206 9207 9208 9209 9210 9211 9212 9213 9214 9215 9216 9217 9218 9219 9220 9221 9222 9223 9224 9225 9226 9227 9228 9229 9230 9231 9232 9233 9234 9235 9236 9237 9238 9239 9240 9241 9242 9243 9244 9245 9246 9247 9248 9249 9250 9251 9252 9253 9254 9255 9256 9257 9258 9259 9260 9261 9262 9263 9264 9265 9266 9267 9268 9269 9270 9271 9272 9273 9274 9275 9276 9277 9278 9279 9280 9281 9282 9283 9284 9285 9286 9287 9288 9289 9290 9291 9292 9293 9294 9295 9296 9297 9298 9299 9300 9301 9302 9303 9304 9305 9306 9307 9308 9309 9310 9311 9312 9313 9314 9315 9316 9317 9318 9319 9320 9321 9322 9323 9324 9325 9326 9327 9328 9329 9330 9331 9332 9333 9334 9335 9336 9337 9338 9339 9340 9341 9342 9343 9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355 9356 9357 9358 9359 9360 9361 9362 9363 9364 9365 9366 9367 9368 9369 9370 9371 9372 9373 9374 9375 9376 9377 9378 9379 9380 9381 9382 9383 9384 9385 9386 9387 9388 9389 9390 9391 9392 9393 9394 9395 9396 9397 9398 9399 9400 9401 9402 9403 9404 9405 9406 9407 9408 9409 9410 9411 9412 9413 9414 9415 9416 9417 9418 9419 9420 9421 9422 9423 9424 9425 9426 9427 9428 9429 9430 9431 9432 9433 9434 9435 9436 9437 9438 9439 9440 9441 9442 9443 9444 9445 9446 9447 9448 9449 9450 9451 9452 9453 9454 9455 9456 9457 9458 9459 9460 9461 9462 9463 9464 9465 9466 9467 9468 9469 9470 9471 9472 9473 9474 9475 9476 9477 9478 9479 9480 9481 9482 9483 9484 9485 9486 9487 9488 9489 9490 9491 9492 9493 9494 9495 9496 9497 9498 9499 9500 9501 9502 9503 9504 9505 9506 9507 9508 9509 9510 9511 9512 9513 9514 9515 9516 9517 9518 9519 9520 9521 9522 9523 9524 9525 9526 9527 9528 9529 9530 9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542 9543 9544 9545 9546 9547 9548 9549 9550 9551 9552 9553 9554 9555 9556 9557 9558 9559 9560 9561 9562 9563 9564 9565 9566 9567 9568 9569 9570 9571 9572 9573 9574 9575 9576 9577 9578 9579 9580 9581 9582 9583 9584 9585 9586 9587 9588 9589 9590 9591 9592 9593 9594 9595 9596 9597 9598 9599 9600 9601 9602 9603 9604 9605 9606 9607 9608 9609 9610 9611 9612 9613 9614 9615 9616 9617 9618 9619 9620 9621 9622 9623 9624 9625 9626 9627 9628 9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640 9641 9642 9643 9644 9645 9646 9647 9648 9649 9650 9651 9652 9653 9654 9655 9656 9657 9658 9659 9660 9661 9662 9663 9664 9665 9666 9667 9668 9669 9670 9671 9672 9673 9674 9675 9676 9677 9678 9679 9680 9681 9682 9683 9684 9685 9686 9687 9688 9689 9690 9691 9692 9693 9694 9695 9696 9697 9698 9699 9700 9701 9702 9703 9704 9705 9706 9707 9708 9709 9710 9711 9712 9713 9714 9715 9716 9717 9718 9719 9720 9721 9722 9723 9724 9725 9726 9727 9728 9729 9730 9731 9732 9733 9734 9735 9736 9737 9738 9739 9740 9741 9742 9743 9744 9745 9746 9747 9748 9749 9750 9751 9752 9753 9754 9755 9756 9757 9758 9759 9760 9761 9762 9763 9764 9765 9766 9767 9768 9769 9770 9771 9772 9773 9774 9775 9776 9777 9778 9779 9780 9781 9782 9783 9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815 9816 9817 9818 9819 9820 9821 9822 9823 9824 9825 9826 9827 9828 9829 9830 9831 9832 9833 9834 9835 9836 9837 9838 9839 9840 9841 9842 9843 9844 9845 9846 9847 9848 9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866 9867 9868 9869 9870 9871 9872 9873 9874 9875 9876 9877 9878 9879 9880 9881 9882 9883 9884 9885 9886 9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898 9899 9900 9901 9902 9903 9904 9905 9906 9907 9908 9909 9910 9911 9912 9913 9914 9915 9916 9917 9918 9919 9920 9921 9922 9923 9924 9925 9926 9927 9928 9929 9930 9931 9932 9933 9934 9935 9936 9937 9938 9939 9940 9941 9942 9943 9944 9945 9946 9947 9948 9949 9950 9951 9952 9953 9954 9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965 9966 9967 9968 9969 9970 9971 9972 9973 9974 9975 9976 9977 9978 9979 9980 9981 9982 9983 9984 9985 9986 9987 9988 9989 9990 9991 9992 9993 9994 9995 9996 9997 9998 9999 10000 10001 10002 10003 10004 10005 10006 10007 10008 10009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023 10024 10025 10026 10027 10028 10029 10030 10031 10032 10033 10034 10035 10036 10037 10038 10039 10040 10041 10042 10043 10044 10045 10046 10047 10048 10049 10050 10051 10052 10053 10054 10055 10056 10057 10058 10059 10060 10061 10062 10063 10064 10065 10066 10067 10068 10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080 10081 10082 10083 10084 10085 10086 10087 10088 10089 10090 10091 10092 10093 10094 10095 10096 10097 10098 10099 10100 10101 10102 10103 10104 10105 10106 10107 10108 10109 10110 10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127 10128 10129 10130 10131 10132 10133 10134 10135 10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147 10148 10149 10150 10151 10152 10153 10154 10155 10156 10157 10158 10159 10160 10161 10162 10163 10164 10165 10166 10167 10168 10169 10170 10171 10172 10173 10174 10175 10176 10177 10178 10179 10180 10181 10182 10183 10184 10185 10186 10187 10188 10189 10190 10191 10192 10193 10194 10195 10196 10197 10198 10199 10200 10201 10202 10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224 10225 10226 10227 10228 10229 10230 10231 10232 10233 10234 10235 10236 10237 10238 10239 10240 10241 10242 10243 10244 10245 10246 10247 10248 10249 10250 10251 10252 10253 10254 10255 10256 10257 10258 10259 10260 10261 10262 10263 10264 10265 10266 10267 10268 10269 10270 10271 10272 10273 10274 10275 10276 10277 10278 10279 10280 10281 10282 10283 10284 10285 10286 10287 10288 10289 10290 10291 10292 10293 10294 10295 10296 10297 10298 10299 10300 10301 10302 10303 10304 10305 10306 10307 10308 10309 10310 10311 10312 10313 10314 10315 10316 10317 10318 10319 10320 10321 10322 10323 10324 10325 10326 10327 10328 10329 10330 10331 10332 10333 10334 10335 10336 10337 10338 10339 10340 10341 10342 10343 10344 10345 10346 10347 10348 10349 10350 10351 10352 10353 10354 10355 10356 10357 10358 10359 10360 10361 10362 10363 10364 10365 10366 10367 10368 10369 10370 10371 10372 10373 10374 10375 10376 10377 10378 10379 10380 10381 10382 10383 10384 10385 10386 10387 10388 10389 10390 10391 10392 10393 10394 10395 10396 10397 10398 10399 10400 10401 10402 10403 10404 10405 10406 10407 10408 10409 10410 10411 10412 10413 10414 10415 10416 10417 10418 10419 10420 10421 10422 10423 10424 10425 10426 10427 10428 10429 10430 10431 10432 10433 10434 10435 10436 10437 10438 10439 10440 10441 10442 10443 10444 10445 10446 10447 10448 10449 10450 10451 10452 10453 10454 10455 10456 10457 10458 10459 10460 10461 10462 10463 10464 10465 10466 10467 10468 10469 10470 10471 10472 10473 10474 10475 10476 10477 10478 10479 10480 10481 10482 10483 10484 10485 10486 10487 10488 10489 10490 10491 10492 10493 10494 10495 10496 10497 10498 10499 10500 10501 10502 10503 10504 10505 10506 10507 10508 10509 10510 10511 10512 10513 10514 10515 10516 10517 10518 10519 10520 10521 10522 10523 10524 10525 10526 10527 10528 10529 10530 10531 10532 10533 10534 10535 10536 10537 10538 10539 10540 10541 10542 10543 10544 10545 10546 10547 10548 10549 10550 10551 10552 10553 10554 10555 10556 10557 10558 10559 10560 10561 10562 10563 10564 10565 10566 10567 10568 10569 10570 10571 10572 10573 10574 10575 10576 10577 10578 10579 10580 10581 10582 10583 10584 10585 10586 10587 10588 10589 10590 10591 10592 10593 10594 10595 10596 10597 10598 10599 10600 10601 10602 10603 10604 10605 10606 10607 10608 10609 10610 10611 10612 10613 10614 10615 10616 10617 10618 10619 10620 10621 10622 10623 10624 10625 10626 10627 10628 10629 10630 10631 10632 10633 10634 10635 10636 10637 10638 10639 10640 10641 10642 10643 10644 10645 10646 10647 10648 10649 10650 10651 10652 10653 10654 10655 10656 10657 10658 10659 10660 10661 10662 10663 10664 10665 10666 10667 10668 10669 10670 10671 10672 10673 10674 10675 10676 10677 10678 10679 10680 10681 10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698 10699 10700 10701 10702 10703 10704 10705 10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716 10717 10718 10719 10720 10721 10722 10723 10724 10725 10726 10727 10728 10729 10730 10731 10732 10733 10734 10735 10736 10737 10738 10739 10740 10741 10742 10743 10744 10745 10746 10747 10748 10749 10750 10751 10752 10753 10754 10755 10756 10757 10758 10759 10760 10761 10762 10763 10764 10765 10766 10767 10768 10769 10770 10771 10772 10773 10774 10775 10776 10777 10778 10779 10780 10781 10782 10783 10784 10785 10786 10787 10788 10789 10790 10791 10792 10793 10794 10795 10796 10797 10798 10799 10800 10801 10802 10803 10804 10805 10806 10807 10808 10809 10810 10811 10812 10813 10814 10815 10816 10817 10818 10819 10820 10821 10822 10823 10824 10825 10826 10827 10828 10829 10830 10831 10832 10833 10834 10835 10836 10837 10838 10839 10840 10841 10842 10843 10844 10845 10846 10847 10848 10849 10850 10851 10852 10853 10854 10855 10856 10857 10858 10859 10860 10861 10862 10863 10864 10865 10866 10867 10868 10869 10870 10871 10872 10873 10874 10875 10876 10877 10878 10879 10880 10881 10882 10883 10884 10885 10886 10887 10888 10889 10890 10891 10892 10893 10894 10895 10896 10897 10898 10899 10900 10901 10902 10903 10904 10905 10906 10907 10908 10909 10910 10911 10912 10913 10914 10915 10916 10917 10918 10919 10920 10921 10922 10923 10924 10925 10926 10927 10928 10929 10930 10931 10932 10933 10934 10935 10936 10937 10938 10939 10940 10941 10942 10943 10944 10945 10946 10947 10948 10949 10950 10951 10952 10953 10954 10955 10956 10957 10958 10959 10960 10961 10962 10963 10964 10965 10966 10967 10968 10969 10970 10971 10972 10973 10974 10975 10976 10977 10978 10979 10980 10981 10982 10983 10984 10985 10986 10987 10988 10989 10990 10991 10992 10993 10994 10995 10996 10997 10998 10999 11000 11001 11002 11003 11004 11005 11006 11007 11008 11009 11010 11011 11012 11013 11014 11015 11016 11017 11018 11019 11020 11021 11022 11023 11024 11025 11026 11027 11028 11029 11030 11031 11032 11033 11034 11035 11036 11037 11038 11039 11040 11041 11042 11043 11044 11045 11046 11047 11048 11049 11050 11051 11052 11053 11054 11055 11056 11057 11058 11059 11060 11061 11062 11063 11064 11065 11066 11067 11068 11069 11070 11071 11072 11073 11074 11075 11076 11077 11078 11079 11080 11081 11082 11083 11084 11085 11086 11087 11088 11089 11090 11091 11092 11093 11094 11095 11096 11097 11098 11099 11100 11101 11102 11103 11104 11105 11106 11107 11108 11109 11110 11111 11112 11113 11114 11115 11116 11117 11118 11119 11120 11121 11122 11123 11124 11125 11126 11127 11128 11129 11130 11131 11132 11133 11134 11135 11136 11137 11138 11139 11140 11141 11142 11143 11144 11145 11146 11147 11148 11149 11150 11151 11152 11153 11154 11155 11156 11157 11158 11159 11160 11161 11162 11163 11164 11165 11166 11167 11168 11169 11170 11171 11172 11173 11174 11175 11176 11177 11178 11179 11180 11181 11182 11183 11184 11185 11186 11187 11188 11189 11190 11191 11192 11193 11194 11195 11196 11197 11198 11199 11200 11201 11202 11203 11204 11205 11206 11207 11208 11209 11210 11211 11212 11213 11214 11215 11216 11217 11218 11219 11220 11221 11222 11223 11224 11225 11226 11227 11228 11229 11230 11231 11232 11233 11234 11235 11236 11237 11238 11239 11240 11241 11242 11243 11244 11245 11246 11247 11248 11249 11250 11251 11252 11253 11254 11255 11256 11257 11258 11259 11260 11261 11262 11263 11264 11265 11266 11267 11268 11269 11270 11271 11272 11273 11274 11275 11276 11277 11278 11279 11280 11281 11282 11283 11284 11285 11286 11287 11288 11289 11290 11291 11292 11293 11294 11295 11296 11297 11298 11299 11300 11301 11302 11303 11304 11305 11306 11307 11308 11309 11310 11311 11312 11313 11314 11315 11316 11317 11318 11319 11320 11321 11322 11323 11324 11325 11326 11327 11328 11329 11330 11331 11332 11333 11334 11335 11336 11337 11338 11339 11340 11341 11342 11343 11344 11345 11346 11347 11348 11349 11350 11351 11352 11353 11354 11355 11356 11357 11358 11359 11360 11361 11362 11363 11364 11365 11366 11367 11368 11369 11370 11371 11372 11373 11374 11375 11376 11377 11378 11379 11380 11381 11382 11383 11384 11385 11386 11387 11388 11389 11390 11391 11392 11393 11394 11395 11396 11397 11398 11399 11400 11401 11402 11403 11404 11405 11406 11407 11408 11409 11410 11411 11412 11413 11414 11415 11416 11417 11418 11419 11420 11421 11422 11423 11424 11425 11426 11427 11428 11429 11430 11431 11432 11433 11434 11435 11436 11437 11438 11439 11440 11441 11442 11443 11444 11445 11446 11447 11448 11449 11450 11451 11452 11453 11454 11455 11456 11457 11458 11459 11460 11461 11462 11463 11464 11465 11466 11467 11468 11469 11470 11471 11472 11473 11474 11475 11476 11477 11478 11479 11480 11481 11482 11483 11484 11485 11486 11487 11488 11489 11490 11491 11492 11493 11494 11495 11496 11497 11498 11499 11500 11501 11502 11503 11504 11505 11506 11507 11508 11509 11510 11511 11512 11513 11514 11515 11516 11517 11518 11519 11520 11521 11522 11523 11524 11525 11526 11527 11528 11529 11530 11531 11532 11533 11534 11535 11536 11537 11538 11539 11540 11541 11542 11543 11544 11545 11546 11547 11548 11549 11550 11551 11552 11553 11554 11555 11556 11557 11558 11559 11560 11561 11562 11563 11564 11565 11566 11567 11568 11569 11570 11571 11572 11573 11574 11575 11576 11577 11578 11579 11580 11581 11582 11583 11584 11585 11586 11587 11588 11589 11590 11591 11592 11593 11594 11595 11596 11597 11598 11599 11600 11601 11602 11603 11604 11605 11606 11607 11608 11609 11610 11611 11612 11613 11614 11615 11616 11617 11618 11619 11620 11621 11622 11623 11624 11625 11626 11627 11628 11629 11630 11631 11632 11633 11634 11635 11636 11637 11638 11639 11640 11641 11642 11643 11644 11645 11646 11647 11648 11649 11650 11651 11652 11653 11654 11655 11656 11657 11658 11659 11660 11661 11662 11663 11664 11665 11666 11667 11668 11669 11670 11671 11672 11673 11674 11675 11676 11677 11678 11679 11680 11681 11682 11683 11684 11685 11686 11687 11688 11689 11690 11691 11692 11693 11694 11695 11696 11697 11698 11699 11700 11701 11702 11703 11704 11705 11706 11707 11708 11709 11710 11711 11712 11713 11714 11715 11716 11717 11718 11719 11720 11721 11722 11723 11724 11725 11726 11727 11728 11729 11730 11731 11732 11733 11734 11735 11736 11737 11738 11739 11740 11741 11742 11743 11744 11745 11746 11747 11748 11749 11750 11751 11752 11753 11754 11755 11756 11757 11758 11759 11760 11761 11762 11763 11764 11765 11766 11767 11768 11769 11770 11771 11772 11773 11774 11775 11776 11777 11778 11779 11780 11781 11782 11783 11784 11785 11786 11787 11788 11789 11790 11791 11792 11793 11794 11795 11796 11797 11798 11799 11800 11801 11802 11803 11804 11805 11806 11807 11808 11809 11810 11811 11812 11813 11814 11815 11816 11817 11818 11819 11820 11821 11822 11823 11824 11825 11826 11827 11828 11829 11830 11831 11832 11833 11834 11835 11836 11837 11838 11839 11840 11841 11842 11843 11844 11845 11846 11847 11848 11849 11850 11851 11852 11853 11854 11855 11856 11857 11858 11859 11860 11861 11862 11863 11864 11865 11866 11867 11868 11869 11870 11871 11872 11873 11874 11875 11876 11877 11878 11879 11880 11881 11882 11883 11884 11885 11886 11887 11888 11889 11890 11891 11892 11893 11894 11895 11896 11897 11898 11899 11900 11901 11902 11903 11904 11905 11906 11907 11908 11909 11910 11911 11912 11913 11914 11915 11916 11917 11918 11919 11920 11921 11922 11923 11924 11925 11926 11927 11928 11929 11930 11931 11932 11933 11934 11935 11936 11937 11938 11939 11940 11941 11942 11943 11944 11945 11946 11947 11948 11949 11950 11951 11952 11953 11954 11955 11956 11957 11958 11959 11960 11961 11962 11963 11964 11965 11966 11967 11968 11969 11970 11971 11972 11973 11974 11975 11976 11977 11978 11979 11980 11981 11982 11983 11984 11985 11986 11987 11988 11989 11990 11991 11992 11993 11994 11995 11996 11997 11998 11999 12000 12001 12002 12003 12004 12005 12006 12007 12008 12009 12010 12011 12012 12013 12014 12015 12016 12017 12018 12019 12020 12021 12022 12023 12024 12025 12026 12027 12028 12029 12030 12031 12032 12033 12034 12035 12036 12037 12038 12039 12040 12041 12042 12043 12044 12045 12046 12047 12048 12049 12050 12051 12052 12053 12054 12055 12056 12057 12058 12059 12060 12061 12062 12063 12064 12065 12066 12067 12068 12069 12070 12071 12072 12073 12074 12075 12076 12077 12078 12079 12080 12081 12082 12083 12084 12085 12086 12087 12088 12089 12090 12091 12092 12093 12094 12095 12096 12097 12098 12099 12100 12101 12102 12103 12104 12105 12106 12107 12108 12109 12110 12111 12112 12113 12114 12115 12116 12117 12118 12119 12120 12121 12122 12123 12124 12125 12126 12127 12128 12129 12130 12131 12132 12133 12134 12135 12136 12137 12138 12139 12140 12141 12142 12143 12144 12145 12146 12147 12148 12149 12150 12151 12152 12153 12154 12155 12156 12157 12158 12159 12160 12161 12162 12163 12164 12165 12166 12167 12168 12169 12170 12171 12172 12173 12174 12175 12176 12177 12178 12179 12180 12181 12182 12183 12184 12185 12186 12187 12188 12189 12190 12191 12192 12193 12194 12195 12196 12197 12198 12199 12200 12201 12202 12203 12204 12205 12206 12207 12208 12209 12210 12211 12212 12213 12214 12215 12216 12217 12218 12219 12220 12221 12222 12223 12224 12225 12226 12227 12228 12229 12230 12231 12232 12233 12234 12235 12236 12237 12238 12239 12240 12241 12242 12243 12244 12245 12246 12247 12248 12249 12250 12251 12252 12253 12254 12255 12256 12257 12258 12259 12260 12261 12262 12263 12264 12265 12266 12267 12268 12269 12270 12271 12272 12273 12274 12275 12276 12277 12278 12279 12280 12281 12282 12283 12284 12285 12286 12287 12288 12289 12290 12291 12292 12293 12294 12295 12296 12297 12298 12299 12300 12301 12302 12303 12304 12305 12306 12307 12308 12309 12310 12311 12312 12313 12314 12315 12316 12317 12318 12319 12320 12321 12322 12323 12324 12325 12326 12327 12328 12329 12330 12331 12332 12333 12334 12335 12336 12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349 12350 12351 12352 12353 12354 12355 12356 12357 12358 12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376 12377 12378 12379 12380 12381 12382 12383 12384 12385 12386 12387 12388 12389 12390 12391 12392 12393 12394 12395 12396 12397 12398 12399 12400 12401 12402 12403 12404 12405 12406 12407 12408 12409 12410 12411 12412 12413 12414 12415 12416 12417 12418 12419 12420 12421 12422 12423 12424 12425 12426 12427 12428 12429 12430 12431 12432 12433 12434 12435 12436 12437 12438 12439 12440 12441 12442 12443 12444 12445 12446 12447 12448 12449 12450 12451 12452 12453 12454 12455 12456 12457 12458 12459 12460 12461 12462 12463 12464 12465 12466 12467 12468 12469 12470 12471 12472 12473 12474 12475 12476 12477 12478 12479 12480 12481 12482 12483 12484 12485 12486 12487 12488 12489 12490 12491 12492 12493 12494 12495 12496 12497 12498 12499 12500 12501 12502 12503 12504 12505 12506 12507 12508 12509 12510 12511 12512 12513 12514 12515 12516 12517 12518 12519 12520 12521 12522 12523 12524 12525 12526 12527 12528 12529 12530 12531 12532 12533 12534 12535 12536 12537 12538 12539 12540 12541 12542 12543 12544 12545 12546 12547 12548 12549 12550 12551 12552 12553 12554 12555 12556 12557 12558 12559 12560 12561 12562 12563 12564 12565 12566 12567 12568 12569 12570 12571 12572 12573 12574 12575 12576 12577 12578 12579 12580 12581 12582 12583 12584 12585 12586 12587 12588 12589 12590 12591 12592 12593 12594 12595 12596 12597 12598 12599 12600 12601 12602 12603 12604 12605 12606 12607 12608 12609 12610 12611 12612 12613 12614 12615 12616 12617 12618 12619 12620 12621 12622 12623 12624 12625 12626 12627 12628 12629 12630 12631 12632 12633 12634 12635 12636 12637 12638 12639 12640 12641 12642 12643 12644 12645 12646 12647 12648 12649 12650 12651 12652 12653 12654 12655 12656 12657 12658 12659 12660 12661 12662 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672 12673 12674 12675 12676 12677 12678 12679 12680 12681 12682 12683 12684 12685 12686 12687 12688 12689 12690 12691 12692 12693 12694 12695 12696 12697 12698 12699 12700 12701 12702 12703 12704 12705 12706 12707 12708 12709 12710 12711 12712 12713 12714 12715 12716 12717 12718 12719 12720 12721 12722 12723 12724 12725 12726 12727 12728 12729 12730 12731 12732 12733 12734 12735 12736 12737 12738 12739 12740 12741 12742 12743 12744 12745 12746 12747 12748 12749 12750 12751 12752 12753 12754 12755 12756 12757 12758 12759 12760 12761 12762 12763 12764 12765 12766 12767 12768 12769 12770 12771 12772 12773 12774 12775 12776 12777 12778 12779 12780 12781 12782 12783 12784 12785 12786 12787 12788 12789 12790 12791 12792 12793 12794 12795 12796 12797 12798 12799 12800 12801 12802 12803 12804 12805 12806 12807 12808 12809 12810 12811 12812 12813 12814 12815 12816 12817 12818 12819 12820 12821 12822 12823 12824 12825 12826 12827 12828 12829 12830 12831 12832 12833 12834 12835 12836 12837 12838 12839 12840 12841 12842 12843 12844 12845 12846 12847 12848 12849 12850 12851 12852 12853 12854 12855 12856 12857 12858 12859 12860 12861 12862 12863 12864 12865 12866 12867 12868 12869 12870 12871 12872 12873 12874 12875 12876 12877 12878 12879 12880 12881 12882 12883 12884 12885 12886 12887 12888 12889 12890 12891 12892 12893 12894 12895 12896 12897 12898 12899 12900 12901 12902 12903 12904 12905 12906 12907 12908 12909 12910 12911 12912 12913 12914 12915 12916 12917 12918 12919 12920 12921 12922 12923 12924 12925 12926 12927 12928 12929 12930 12931 12932 12933 12934 12935 12936 12937 12938 12939 12940 12941 12942 12943 12944 12945 12946 12947 12948 12949 12950 12951 12952 12953 12954 12955 12956 12957 12958 12959 12960 12961 12962 12963 12964 12965 12966 12967 12968 12969 12970 12971 12972 12973 12974 12975 12976 12977 12978 12979 12980 12981 12982 12983 12984 12985 12986 12987 12988 12989 12990 12991 12992 12993 12994 12995 12996 12997 12998 12999 13000 13001 13002 13003 13004 13005 13006 13007 13008 13009 13010 13011 13012 13013 13014 13015 13016 13017 13018 13019 13020 13021 13022 13023 13024 13025 13026 13027 13028 13029 13030 13031 13032 13033 13034 13035 13036 13037 13038 13039 13040 13041 13042 13043 13044 13045 13046 13047 13048 13049 13050 13051 13052 13053 13054 13055 13056 13057 13058 13059 13060 13061 13062 13063 13064 13065 13066 13067 13068 13069 13070 13071 13072 13073 13074 13075 13076 13077 13078 13079 13080 13081 13082 13083 13084 13085 13086 13087 13088 13089 13090 13091 13092 13093 13094 13095 13096 13097 13098 13099 13100 13101 13102 13103 13104 13105 13106 13107 13108 13109 13110 13111 13112 13113 13114 13115 13116 13117 13118 13119 13120 13121 13122 13123 13124 13125 13126 13127 13128 13129 13130 13131 13132 13133 13134 13135 13136 13137 13138 13139 13140 13141 13142 13143 13144 13145 13146 13147 13148 13149 13150 13151 13152 13153 13154 13155 13156 13157 13158 13159 13160 13161 13162 13163 13164 13165 13166 13167 13168 13169 13170 13171 13172 13173 13174 13175 13176 13177 13178 13179 13180 13181 13182 13183 13184 13185 13186 13187 13188 13189 13190 13191 13192 13193 13194 13195 13196 13197 13198 13199 13200 13201 13202 13203 13204 13205 13206 13207 13208 13209 13210 13211 13212 13213 13214 13215 13216 13217 13218 13219 13220 13221 13222 13223 13224 13225 13226 13227 13228 13229 13230 13231 13232 13233 13234 13235 13236 13237 13238 13239 13240 13241 13242 13243 13244 13245 13246 13247 13248 13249 13250 13251 13252 13253 13254 13255 13256 13257 13258 13259 13260 13261 13262 13263 13264 13265 13266 13267 13268 13269 13270 13271 13272 13273 13274 13275 13276 13277 13278 13279 13280 13281 13282 13283 13284 13285 13286 13287 13288 13289 13290 13291 13292 13293 13294 13295 13296 13297 13298 13299 13300 13301 13302 13303 13304 13305 13306 13307 13308 13309 13310 13311 13312 13313 13314 13315 13316 13317 13318 13319 13320 13321 13322 13323 13324 13325 13326 13327 13328 13329 13330 13331 13332 13333 13334 13335 13336 13337 13338 13339 13340 13341 13342 13343 13344 13345 13346 13347 13348 13349 13350 13351 13352 13353 13354 13355 13356 13357 13358 13359 13360 13361 13362 13363 13364 13365 13366 13367 13368 13369 13370 13371 13372 13373 13374 13375 13376 13377 13378 13379 13380 13381 13382 13383 13384 13385 13386 13387 13388 13389 13390 13391 13392 13393 13394 13395 13396 13397 13398 13399 13400 13401 13402 13403 13404 13405 13406 13407 13408 13409 13410 13411 13412 13413 13414 13415 13416 13417 13418 13419 13420 13421 13422 13423 13424 13425 13426 13427 13428 13429 13430 13431 13432 13433 13434 13435 13436 13437 13438 13439 13440 13441 13442 13443 13444 13445 13446 13447 13448 13449 13450 13451 13452 13453 13454 13455 13456 13457 13458 13459 13460 13461 13462 13463 13464 13465 13466 13467 13468 13469 13470 13471 13472 13473 13474 13475 13476 13477 13478 13479 13480 13481 13482 13483 13484 13485 13486 13487 13488 13489 13490 13491 13492 13493 13494 13495 13496 13497 13498 13499 13500 13501 13502 13503 13504 13505 13506 13507 13508 13509 13510 13511 13512 13513 13514 13515 13516 13517 13518 13519 13520 13521 13522 13523 13524 13525 13526 13527 13528 13529 13530 13531 13532 13533 13534 13535 13536 13537 13538 13539 13540 13541 13542 13543 13544 13545 13546 13547 13548 13549 13550 13551 13552 13553 13554 13555 13556 13557 13558 13559 13560 13561 13562 13563 13564 13565 13566 13567 13568 13569 13570 13571 13572 13573 13574 13575 13576 13577 13578 13579 13580 13581 13582 13583 13584 13585 13586 13587 13588 13589 13590 13591 13592 13593 13594 13595 13596 13597 13598 13599 13600 13601 13602 13603 13604 13605 13606 13607 13608 13609 13610 13611 13612 13613 13614 13615 13616 13617 13618 13619 13620 13621 13622 13623 13624 13625 13626 13627 13628 13629 13630 13631 13632 13633 13634 13635 13636 13637 13638 13639 13640 13641 13642 13643 13644 13645 13646 13647 13648 13649 13650 13651 13652 13653 13654 13655 13656 13657 13658 13659 13660 13661 13662 13663 13664 13665 13666 13667 13668 13669 13670 13671 13672 13673 13674 13675 13676 13677 13678 13679 13680 13681 13682 13683 13684 13685 13686 13687 13688 13689 13690 13691 13692 13693 13694 13695 13696 13697 13698 13699 13700 13701 13702 13703 13704 13705 13706 13707 13708 13709 13710 13711 13712 13713 13714 13715 13716 13717 13718 13719 13720 13721 13722 13723 13724 13725 13726 13727 13728 13729 13730 13731 13732 13733 13734 13735 13736 13737 13738 13739 13740 13741 13742 13743 13744 13745 13746 13747 13748 13749 13750 13751 13752 13753 13754 13755 13756 13757 13758 13759 13760 13761 13762 13763 13764 13765 13766 13767 13768 13769 13770 13771 13772 13773 13774 13775 13776 13777 13778 13779 13780 13781 13782 13783 13784 13785 13786 13787 13788 13789 13790 13791 13792 13793 13794 13795 13796 13797 13798 13799 13800 13801 13802 13803 13804 13805 13806 13807 13808 13809 13810 13811 13812 13813 13814 13815 13816 13817 13818 13819 13820 13821 13822 13823 13824 13825 13826 13827 13828 13829 13830 13831 13832 13833 13834 13835 13836 13837 13838 13839 13840 13841 13842 13843 13844 13845 13846 13847 13848 13849 13850 13851 13852 13853 13854 13855 13856 13857 13858 13859 13860 13861 13862 13863 13864 13865 13866 13867 13868 13869 13870 13871 13872 13873 13874 13875 13876 13877 13878 13879 13880 13881 13882 13883 13884 13885 13886 13887 13888 13889 13890 13891 13892 13893 13894 13895 13896 13897 13898 13899 13900 13901 13902 13903 13904 13905 13906 13907 13908 13909 13910 13911 13912 13913 13914 13915 13916 13917 13918 13919 13920 13921 13922 13923 13924 13925 13926 13927 13928 13929 13930 13931 13932 13933 13934 13935 13936 13937 13938 13939 13940 13941 13942 13943 13944 13945 13946 13947 13948 13949 13950 13951 13952 13953 13954 13955 13956 13957 13958 13959 13960 13961 13962 13963 13964 13965 13966 13967 13968 13969 13970 13971 13972 13973 13974 13975 13976 13977 13978 13979 13980 13981 13982 13983 13984 13985 13986 13987 13988 13989 13990 13991 13992 13993 13994 13995 13996 13997 13998 13999 14000 14001 14002 14003 14004 14005 14006 14007 14008 14009 14010 14011 14012 14013 14014 14015 14016 14017 14018 14019 14020 14021 14022 14023 14024 14025 14026 14027 14028 14029 14030 14031 14032 14033 14034 14035 14036 14037 14038 14039 14040 14041 14042 14043 14044 14045 14046 14047 14048 14049 14050 14051 14052 14053 14054 14055 14056 14057 14058 14059 14060 14061 14062 14063 14064 14065 14066 14067 14068 14069 14070 14071 14072 14073 14074 14075 14076 14077 14078 14079 14080 14081 14082 14083 14084 14085 14086 14087 14088 14089 14090 14091 14092 14093 14094 14095 14096 14097 14098 14099 14100 14101 14102 14103 14104 14105 14106 14107 14108 14109 14110 14111 14112 14113 14114 14115 14116 14117 14118 14119 14120 14121 14122 14123 14124 14125 14126 14127 14128 14129 14130 14131 14132 14133 14134 14135 14136 14137 14138 14139 14140 14141 14142 14143 14144 14145 14146 14147 14148 14149 14150 14151 14152 14153 14154 14155 14156 14157 14158 14159 14160 14161 14162 14163 14164 14165 14166 14167 14168 14169 14170 14171 14172 14173 14174 14175 14176 14177 14178 14179 14180 14181 14182 14183 14184 14185 14186 14187 14188 14189 14190 14191 14192 14193 14194 14195 14196 14197 14198 14199 14200 14201 14202 14203 14204 14205 14206 14207 14208 14209 14210 14211 14212 14213 14214 14215 14216 14217 14218 14219 14220 14221 14222 14223 14224 14225 14226 14227 14228 14229 14230 14231 14232 14233 14234 14235 14236 14237 14238 14239 14240 14241 14242 14243 14244 14245 14246 14247 14248 14249 14250 14251 14252 14253 14254 14255 14256 14257 14258 14259 14260 14261 14262 14263 14264 14265 14266 14267 14268 14269 14270 14271 14272 14273 14274 14275 14276 14277 14278 14279 14280 14281 14282 14283 14284 14285 14286 14287 14288 14289 14290 14291 14292 14293 14294 14295 14296 14297 14298 14299 14300 14301 14302 14303 14304 14305 14306 14307 14308 14309 14310 14311 14312 14313 14314 14315 14316 14317 14318 14319 14320 14321 14322 14323 14324 14325 14326 14327 14328 14329 14330 14331 14332 14333 14334 14335 14336 14337 14338 14339 14340 14341 14342 14343 14344 14345 14346 14347 14348 14349 14350 14351 14352 14353 14354 14355 14356 14357 14358 14359 14360 14361 14362 14363 14364 14365 14366 14367 14368 14369 14370 14371 14372 14373 14374 14375 14376 14377 14378 14379 14380 14381 14382 14383 14384 14385 14386 14387 14388 14389 14390 14391 14392 14393 14394 14395 14396 14397 14398 14399 14400 14401 14402 14403 14404 14405 14406 14407 14408 14409 14410 14411 14412 14413 14414 14415 14416 14417 14418 14419 14420 14421 14422 14423 14424 14425 14426 14427 14428 14429 14430 14431 14432 14433 14434 14435 14436 14437 14438 14439 14440 14441 14442 14443 14444 14445 14446 14447 14448 14449 14450 14451 14452 14453 14454 14455 14456 14457 14458 14459 14460 14461 14462 14463 14464 14465 14466 14467 14468 14469 14470 14471 14472 14473 14474 14475 14476 14477 14478 14479 14480 14481 14482 14483 14484 14485 14486 14487 14488 14489 14490 14491 14492 14493 14494 14495 14496 14497 14498 14499 14500 14501 14502 14503 14504 14505 14506 14507 14508 14509 14510 14511 14512 14513 14514 14515 14516 14517 14518 14519 14520 14521 14522 14523 14524 14525 14526 14527 14528 14529 14530 14531 14532 14533 14534 14535 14536 14537 14538 14539 14540 14541 14542 14543 14544 14545 14546 14547 14548 14549 14550 14551 14552 14553 14554 14555 14556 14557 14558 14559 14560 14561 14562 14563 14564 14565 14566 14567 14568 14569 14570 14571 14572 14573 14574 14575 14576 14577 14578 14579 14580 14581 14582 14583 14584 14585 14586 14587 14588 14589 14590 14591 14592 14593 14594 14595 14596 14597 14598 14599 14600 14601 14602 14603 14604 14605 14606 14607 14608 14609 14610 14611 14612 14613 14614 14615 14616 14617 14618 14619 14620 14621 14622 14623 14624 14625 14626 14627 14628 14629 14630 14631 14632 14633 14634 14635 14636 14637 14638 14639 14640 14641 14642 14643 14644 14645 14646 14647 14648 14649 14650 14651 14652 14653 14654 14655 14656 14657 14658 14659 14660 14661 14662 14663 14664 14665 14666 14667 14668 14669 14670 14671 14672 14673 14674 14675 14676 14677 14678 14679 14680 14681 14682 14683 14684 14685 14686 14687 14688 14689 14690 14691 14692 14693 14694 14695 14696 14697 14698 14699 14700 14701 14702 14703 14704 14705 14706 14707 14708 14709 14710 14711 14712 14713 14714 14715 14716 14717 14718 14719 14720 14721 14722 14723 14724 14725 14726 14727 14728 14729 14730 14731 14732 14733 14734 14735 14736 14737 14738 14739 14740 14741 14742 14743 14744 14745 14746 14747 14748 14749 14750 14751 14752 14753 14754 14755 14756 14757 14758 14759 14760 14761 14762 14763 14764 14765 14766 14767 14768 14769 14770 14771 14772 14773 14774 14775 14776 14777 14778 14779 14780 14781 14782 14783 14784 14785 14786 14787 14788 14789 14790 14791 14792 14793 14794 14795 14796 14797 14798 14799 14800 14801 14802 14803 14804 14805 14806 14807 14808 14809 14810 14811 14812 14813 14814 14815 14816 14817 14818 14819 14820 14821 14822 14823 14824 14825 14826 14827 14828 14829 14830 14831 14832 14833 14834 14835 14836 14837 14838 14839 14840 14841 14842 14843 14844 14845 14846 14847 14848 14849 14850 14851 14852 14853 14854 14855 14856 14857 14858 14859 14860 14861 14862 14863 14864 14865 14866 14867 14868 14869 14870 14871 14872 14873 14874 14875 14876 14877 14878 14879 14880 14881 14882 14883 14884 14885 14886 14887 14888 14889 14890 14891 14892 14893 14894 14895 14896 14897 14898 14899 14900 14901 14902 14903 14904 14905 14906 14907 14908 14909 14910 14911 14912 14913 14914 14915 14916 14917 14918 14919 14920 14921 14922 14923 14924 14925 14926 14927 14928 14929 14930 14931 14932 14933 14934 14935 14936 14937 14938 14939 14940 14941 14942 14943 14944 14945 14946 14947 14948 14949 14950 14951 14952 14953 14954 14955 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 14972 14973 14974 14975 14976 14977 14978 14979 14980 14981 14982 14983 14984 14985 14986 14987 14988 14989 14990 14991 14992 14993 14994 14995 14996 14997 14998 14999 15000 15001 15002 15003 15004 15005 15006 15007 15008 15009 15010 15011 15012 15013 15014 15015 15016 15017 15018 15019 15020 15021 15022 15023 15024 15025 15026 15027 15028 15029 15030 15031 15032 15033 15034 15035 15036 15037 15038 15039 15040 15041 15042 15043 15044 15045 15046 15047 15048 15049 15050 15051 15052 15053 15054 15055 15056 15057 15058 15059 15060 15061 15062 15063 15064 15065 15066 15067 15068 15069 15070 15071 15072 15073 15074 15075 15076 15077 15078 15079 15080 15081 15082 15083 15084 15085 15086 15087 15088 15089 15090 15091 15092 15093 15094 15095 15096 15097 15098 15099 15100 15101 15102 15103 15104 15105 15106 15107 15108 15109 15110 15111 15112 15113 15114 15115 15116 15117 15118 15119 15120 15121 15122 15123 15124 15125 15126 15127 15128 15129 15130 15131 15132 15133 15134 15135 15136 15137 15138 15139 15140 15141 15142 15143 15144 15145 15146 15147 15148 15149 15150 15151 15152 15153 15154 15155 15156 15157 15158 15159 15160 15161 15162 15163 15164 15165 15166 15167 15168 15169 15170 15171 15172 15173 15174 15175 15176 15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191 15192 15193 15194 15195 15196 15197 15198 15199 15200 15201 15202 15203 15204 15205 15206 15207 15208 15209 15210 15211 15212 15213 15214 15215 15216 15217 15218 15219 15220 15221 15222 15223 15224 15225 15226 15227 15228 15229 15230 15231 15232 15233 15234 15235 15236 15237 15238 15239 15240 15241 15242 15243 15244 15245 15246 15247 15248 15249 15250 15251 15252 15253 15254 15255 15256 15257 15258 15259 15260 15261 15262 15263 15264 15265 15266 15267 15268 15269 15270 15271 15272 15273 15274 15275 15276 15277 15278 15279 15280 15281 15282 15283 15284 15285 15286 15287 15288 15289 15290 15291 15292 15293 15294 15295 15296 15297 15298 15299 15300 15301 15302 15303 15304 15305 15306 15307 15308 15309 15310 15311 15312 15313 15314 15315 15316 15317 15318 15319 15320 15321 15322 15323 15324 15325 15326 15327 15328 15329 15330 15331 15332 15333 15334 15335 15336 15337 15338 15339 15340 15341 15342 15343 15344 15345 15346 15347 15348 15349 15350 15351 15352 15353 15354 15355 15356 15357 15358 15359 15360 15361 15362 15363 15364 15365 15366 15367 15368 15369 15370 15371 15372 15373 15374 15375 15376 15377 15378 15379 15380 15381 15382 15383 15384 15385 15386 15387 15388 15389 15390 15391 15392 15393 15394 15395 15396 15397 15398 15399 15400 15401 15402 15403 15404 15405 15406 15407 15408 15409 15410 15411 15412 15413 15414 15415 15416 15417 15418 15419 15420 15421 15422 15423 15424 15425 15426 15427 15428 15429 15430 15431 15432 15433 15434 15435 15436 15437 15438 15439 15440 15441 15442 15443 15444 15445 15446 15447 15448 15449 15450 15451 15452 15453 15454 15455 15456 15457 15458 15459 15460 15461 15462 15463 15464 15465 15466 15467 15468 15469 15470 15471 15472 15473 15474 15475 15476 15477 15478 15479 15480 15481 15482 15483 15484 15485 15486 15487 15488 15489 15490 15491 15492 15493 15494 15495 15496 15497 15498 15499 15500 15501 15502 15503 15504 15505 15506 15507 15508 15509 15510 15511 15512 15513 15514 15515 15516 15517 15518 15519 15520 15521 15522 15523 15524 15525 15526 15527 15528 15529 15530 15531 15532 15533 15534 15535 15536 15537 15538 15539 15540 15541 15542 15543 15544 15545 15546 15547 15548 15549 15550 15551 15552 15553 15554 15555 15556 15557 15558 15559 15560 15561 15562 15563 15564 15565 15566 15567 15568 15569 15570 15571 15572 15573 15574 15575 15576 15577 15578 15579 15580 15581 15582 15583 15584 15585 15586 15587 15588 15589 15590 15591 15592 15593 15594 15595 15596 15597 15598 15599 15600 15601 15602 15603 15604 15605 15606 15607 15608 15609 15610 15611 15612 15613 15614 15615 15616 15617 15618 15619 15620 15621 15622 15623 15624 15625 15626 15627 15628 15629 15630 15631 15632 15633 15634 15635 15636 15637 15638 15639 15640 15641 15642 15643 15644 15645 15646 15647 15648 15649 15650 15651 15652 15653 15654 15655 15656 15657 15658 15659 15660 15661 15662 15663 15664 15665 15666 15667 15668 15669 15670 15671 15672 15673 15674 15675 15676 15677 15678 15679 15680 15681 15682 15683 15684 15685 15686 15687 15688 15689 15690 15691 15692 15693 15694 15695 15696 15697 15698 15699 15700 15701 15702 15703 15704 15705 15706 15707 15708 15709 15710 15711 15712 15713 15714 15715 15716 15717 15718 15719 15720 15721 15722 15723 15724 15725 15726 15727 15728 15729 15730 15731 15732 15733 15734 15735 15736 15737 15738 15739 15740 15741 15742 15743 15744 15745 15746 15747 15748 15749 15750 15751 15752 15753 15754 15755 15756 15757 15758 15759 15760 15761 15762 15763 15764 15765 15766 15767 15768 15769 15770 15771 15772 15773 15774 15775 15776 15777 15778 15779 15780 15781 15782 15783 15784 15785 15786 15787 15788 15789 15790 15791 15792 15793 15794 15795 15796 15797 15798 15799 15800 15801 15802 15803 15804 15805 15806 15807 15808 15809 15810 15811 15812 15813 15814 15815 15816 15817 15818 15819 15820 15821 15822 15823 15824 15825 15826 15827 15828 15829 15830 15831 15832 15833 15834 15835 15836 15837 15838 15839 15840 15841 15842 15843 15844 15845 15846 15847 15848 15849 15850 15851 15852 15853 15854 15855 15856 15857 15858 15859 15860 15861 15862 15863 15864 15865 15866 15867 15868 15869 15870 15871 15872 15873 15874 15875 15876 15877 15878 15879 15880 15881 15882 15883 15884 15885 15886 15887 15888 15889 15890 15891 15892 15893 15894 15895 15896 15897 15898 15899 15900 15901 15902 15903 15904 15905 15906 15907 15908 15909 15910 15911 15912 15913 15914 15915 15916 15917 15918 15919 15920 15921 15922 15923 15924 15925 15926 15927 15928 15929 15930 15931 15932 15933 15934 15935 15936 15937 15938 15939 15940 15941 15942 15943 15944 15945 15946 15947 15948 15949 15950 15951 15952 15953 15954 15955 15956 15957 15958 15959 15960 15961 15962 15963 15964 15965 15966 15967 15968 15969 15970 15971 15972 15973 15974 15975 15976 15977 15978 15979 15980 15981 15982 15983 15984 15985 15986 15987 15988 15989 15990 15991 15992 15993 15994 15995 15996 15997 15998 15999 16000 16001 16002 16003 16004 16005 16006 16007 16008 16009 16010 16011 16012 16013 16014 16015 16016 16017 16018 16019 16020 16021 16022 16023 16024 16025 16026 16027 16028 16029 16030 16031 16032 16033 16034 16035 16036 16037 16038 16039 16040 16041 16042 16043 16044 16045 16046 16047 16048 16049 16050 16051 16052 16053 16054 16055 16056 16057 16058 16059 16060 16061 16062 16063 16064 16065 16066 16067 16068 16069 16070 16071 16072 16073 16074 16075 16076 16077 16078 16079 16080 16081 16082 16083 16084 16085 16086 16087 16088 16089 16090 16091 16092 16093 16094 16095 16096 16097 16098 16099 16100 16101 16102 16103 16104 16105 16106 16107 16108 16109 16110 16111 16112 16113 16114 16115 16116 16117 16118 16119 16120 16121 16122 16123 16124 16125 16126 16127 16128 16129 16130 16131 16132 16133 16134 16135 16136 16137 16138 16139 16140 16141 16142 16143 16144 16145 16146 16147 16148 16149 16150 16151 16152 16153 16154 16155 16156 16157 16158 16159 16160 16161 16162 16163 16164 16165 16166 16167 16168 16169 16170 16171 16172 16173 16174 16175 16176 16177 16178 16179 16180 16181 16182 16183 16184 16185 16186 16187 16188 16189 16190 16191 16192 16193 16194 16195 16196 16197 16198 16199 16200 16201 16202 16203 16204 16205 16206 16207 16208 16209 16210 16211 16212 16213 16214 16215 16216 16217 16218 16219 16220 16221 16222 16223 16224 16225 16226 16227 16228 16229 16230 16231 16232 16233 16234 16235 16236 16237 16238 16239 16240 16241 16242 16243 16244 16245 16246 16247 16248 16249 16250 16251 16252 16253 16254 16255 16256 16257 16258 16259 16260 16261 16262 16263 16264 16265 16266 16267 16268 16269 16270 16271 16272 16273 16274 16275 16276 16277 16278 16279 16280 16281 16282 16283 16284 16285 16286 16287 16288 16289 16290 16291 16292 16293 16294 16295 16296 16297 16298 16299 16300 16301 16302 16303 16304 16305 16306 16307 16308 16309 16310 16311 16312 16313 16314 16315 16316 16317 16318 16319 16320 16321 16322 16323 16324 16325 16326 16327 16328 16329 16330 16331 16332 16333 16334 16335 16336 16337 16338 16339 16340 16341 16342 16343 16344 16345 16346 16347 16348 16349 16350 16351 16352 16353 16354 16355 16356 16357 16358 16359 16360 16361 16362 16363 16364 16365 16366 16367 16368 16369 16370 16371 16372 16373 16374 16375 16376 16377 16378 16379 16380 16381 16382 16383 16384 16385 16386 16387 16388 16389 16390 16391 16392 16393 16394 16395 16396 16397 16398 16399 16400 16401 16402 16403 16404 16405 16406 16407 16408 16409 16410 16411 16412 16413 16414 16415 16416 16417 16418 16419 16420 16421 16422 16423 16424 16425 16426 16427 16428 16429 16430 16431 16432 16433 16434 16435 16436 16437 16438 16439 16440 16441 16442 16443 16444 16445 16446 16447 16448 16449 16450 16451 16452 16453 16454 16455 16456 16457 16458 16459 16460 16461 16462 16463 16464 16465 16466 16467 16468 16469 16470 16471 16472 16473 16474 16475 16476 16477 16478 16479 16480 16481 16482 16483 16484 16485 16486 16487 16488 16489 16490 16491 16492 16493 16494 16495 16496 16497 16498 16499 16500 16501 16502 16503 16504 16505 16506 16507 16508 16509 16510 16511 16512 16513 16514 16515 16516 16517 16518 16519 16520 16521 16522 16523 16524 16525 16526 16527 16528 16529 16530 16531 16532 16533 16534 16535 16536 16537 16538 16539 16540 16541 16542 16543 16544 16545 16546 16547 16548 16549 16550 16551 16552 16553 16554 16555 16556 16557 16558 16559 16560 16561 16562 16563 16564 16565 16566 16567 16568 16569 16570 16571 16572 16573 16574 16575 16576 16577 16578 16579 16580 16581 16582 16583 16584 16585 16586 16587 16588 16589 16590 16591 16592 16593 16594 16595 16596 16597 16598 16599 16600 16601 16602 16603 16604 16605 16606 16607 16608 16609 16610 16611 16612 16613 16614 16615 16616 16617 16618 16619 16620 16621 16622 16623 16624 16625 16626 16627 16628 16629 16630 16631 16632 16633 16634 16635 16636 16637 16638 16639 16640 16641 16642 16643 16644 16645 16646 16647 16648 16649 16650 16651 16652 16653 16654 16655 16656 16657 16658 16659 16660 16661 16662 16663 16664 16665 16666 16667 16668 16669 16670 16671 16672 16673 16674 16675 16676 16677 16678 16679 16680 16681 16682 16683 16684 16685 16686 16687 16688 16689 16690 16691 16692 16693 16694 16695 16696 16697 16698 16699 16700 16701 16702 16703 16704 16705 16706 16707 16708 16709 16710 16711 16712 16713 16714 16715 16716 16717 16718 16719 16720 16721 16722 16723 16724 16725 16726 16727 16728 16729 16730 16731 16732 16733 16734 16735 16736 16737 16738 16739 16740 16741 16742 16743 16744 16745 16746 16747 16748 16749 16750 16751 16752 16753 16754 16755 16756 16757 16758 16759 16760 16761 16762 16763 16764 16765 16766 16767 16768 16769 16770 16771 16772 16773 16774 16775 16776 16777 16778 16779 16780 16781 16782 16783 16784 16785 16786 16787 16788 16789 16790 16791 16792 16793 16794 16795 16796 16797 16798 16799 16800 16801 16802 16803 16804 16805 16806 16807 16808 16809 16810 16811 16812 16813 16814 16815 16816 16817 16818 16819 16820 16821 16822 16823 16824 16825 16826 16827 16828 16829 16830 16831 16832 16833 16834 16835 16836 16837 16838 16839 16840 16841 16842 16843 16844 16845 16846 16847 16848 16849 16850 16851 16852 16853 16854 16855 16856 16857 16858 16859 16860 16861 16862 16863 16864 16865 16866 16867 16868 16869 16870 16871 16872 16873 16874 16875 16876 16877 16878 16879 16880 16881 16882 16883 16884 16885 16886 16887 16888 16889 16890 16891 16892 16893 16894 16895 16896 16897 16898 16899 16900 16901 16902 16903 16904 16905 16906 16907 16908 16909 16910 16911 16912 16913 16914 16915 16916 16917 16918 16919 16920 16921 16922 16923 16924 16925 16926 16927 16928 16929 16930 16931 16932 16933 16934 16935 16936 16937 16938 16939 16940 16941 16942 16943 16944 16945 16946 16947 16948 16949 16950 16951 16952 16953 16954 16955 16956 16957 16958 16959 16960 16961 16962 16963 16964 16965 16966 16967 16968 16969 16970 16971 16972 16973 16974 16975 16976 16977 16978 16979 16980 16981 16982 16983 16984 16985 16986 16987 16988 16989 16990 16991 16992 16993 16994 16995 16996 16997 16998 16999 17000 17001 17002 17003 17004 17005 17006 17007 17008 17009 17010 17011 17012 17013 17014 17015 17016 17017 17018 17019 17020 17021 17022 17023 17024 17025 17026 17027 17028 17029 17030 17031 17032 17033 17034 17035 17036 17037 17038 17039 17040 17041 17042 17043 17044 17045 17046 17047 17048 17049 17050 17051 17052 17053 17054 17055 17056 17057 17058 17059 17060 17061 17062 17063 17064 17065 17066 17067 17068 17069 17070 17071 17072 17073 17074 17075 17076 17077 17078 17079 17080 17081 17082 17083 17084 17085 17086 17087 17088 17089 17090 17091 17092 17093 17094 17095 17096 17097 17098 17099 17100 17101 17102 17103 17104 17105 17106 17107 17108 17109 17110 17111 17112 17113 17114 17115 17116 17117 17118 17119 17120 17121 17122 17123 17124 17125 17126 17127 17128 17129 17130 17131 17132 17133 17134 17135 17136 17137 17138 17139 17140 17141 17142 17143 17144 17145 17146 17147 17148 17149 17150 17151 17152 17153 17154 17155 17156 17157 17158 17159 17160 17161 17162 17163 17164 17165 17166 17167 17168 17169 17170 17171 17172 17173 17174 17175 17176 17177 17178 17179 17180 17181 17182 17183 17184 17185 17186 17187 17188 17189 17190 17191 17192 17193 17194 17195 17196 17197 17198 17199 17200 17201 17202 17203 17204 17205 17206 17207 17208 17209 17210 17211 17212 17213 17214 17215 17216 17217 17218 17219 17220 17221 17222 17223 17224 17225 17226 17227 17228 17229 17230 17231 17232 17233 17234 17235 17236 17237 17238 17239 17240 17241 17242 17243 17244 17245 17246 17247 17248 17249 17250 17251 17252 17253 17254 17255 17256 17257 17258 17259 17260 17261 17262 17263 17264 17265 17266 17267 17268 17269 17270 17271 17272 17273 17274 17275 17276 17277 17278 17279 17280 17281 17282 17283 17284 17285 17286 17287 17288 17289 17290 17291 17292 17293 17294 17295 17296 17297 17298 17299 17300 17301 17302 17303 17304 17305 17306 17307 17308 17309 17310 17311 17312 17313 17314 17315 17316 17317 17318 17319 17320 17321 17322 17323 17324 17325 17326 17327 17328 17329 17330 17331 17332 17333 17334 17335 17336 17337 17338 17339 17340 17341 17342 17343 17344 17345 17346 17347 17348 17349 17350 17351 17352 17353 17354 17355 17356 17357 17358 17359 17360 17361 17362 17363 17364 17365 17366 17367 17368 17369 17370 17371 17372 17373 17374 17375 17376 17377 17378 17379 17380 17381 17382 17383 17384 17385 17386 17387 17388 17389 17390 17391 17392 17393 17394 17395 17396 17397 17398 17399 17400 17401 17402 17403 17404 17405 17406 17407 17408 17409 17410 17411 17412 17413 17414 17415 17416 17417 17418 17419 17420 17421 17422 17423 17424 17425 17426 17427 17428 17429 17430 17431 17432 17433 17434 17435 17436 17437 17438 17439 17440 17441 17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452 17453 17454 17455 17456 17457 17458 17459 17460 17461 17462 17463 17464 17465 17466 17467 17468 17469 17470 17471 17472 17473 17474 17475 17476 17477 17478 17479 17480 17481 17482 17483 17484 17485 17486 17487 17488 17489 17490 17491 17492 17493 17494 17495 17496 17497 17498 17499 17500 17501 17502 17503 17504 17505 17506 17507 17508 17509 17510 17511 17512 17513 17514 17515 17516 17517 17518 17519 17520 17521 17522 17523 17524 17525 17526 17527 17528 17529 17530 17531 17532 17533 17534 17535 17536 17537 17538 17539 17540 17541 17542 17543 17544 17545 17546 17547 17548 17549 17550 17551 17552 17553 17554 17555 17556 17557 17558 17559 17560 17561 17562 17563 17564 17565 17566 17567 17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578 17579 17580 17581 17582 17583 17584 17585 17586 17587 17588 17589 17590 17591 17592 17593 17594 17595 17596 17597 17598 17599 17600 17601 17602 17603 17604 17605 17606 17607 17608 17609 17610 17611 17612 17613 17614 17615 17616 17617 17618 17619 17620 17621 17622 17623 17624 17625 17626 17627 17628 17629 17630 17631 17632 17633 17634 17635 17636 17637 17638 17639 17640 17641 17642 17643 17644 17645 17646 17647 17648 17649 17650 17651 17652 17653 17654 17655 17656 17657 17658 17659 17660 17661 17662 17663 17664 17665 17666 17667 17668 17669 17670 17671 17672 17673 17674 17675 17676 17677 17678 17679 17680 17681 17682 17683 17684 17685 17686 17687 17688 17689 17690 17691 17692 17693 17694 17695 17696 17697 17698 17699 17700 17701 17702 17703 17704 17705 17706 17707 17708 17709 17710 17711 17712 17713 17714 17715 17716 17717 17718 17719 17720 17721 17722 17723 17724 17725 17726 17727 17728 17729 17730 17731 17732 17733 17734 17735 17736 17737 17738 17739 17740 17741 17742 17743 17744 17745 17746 17747 17748 17749 17750 17751 17752 17753 17754 17755 17756 17757 17758 17759 17760 17761 17762 17763 17764 17765 17766 17767 17768 17769 17770 17771 17772 17773 17774 17775 17776 17777 17778 17779 17780 17781 17782 17783 17784 17785 17786 17787 17788 17789 17790 17791 17792 17793 17794 17795 17796 17797 17798 17799 17800 17801 17802 17803 17804 17805 17806 17807 17808 17809 17810 17811 17812 17813 17814 17815 17816 17817 17818 17819 17820 17821 17822 17823 17824 17825 17826 17827 17828 17829 17830 17831 17832 17833 17834 17835 17836 17837 17838 17839 17840 17841 17842 17843 17844 17845 17846 17847 17848 17849 17850 17851 17852 17853 17854 17855 17856 17857 17858 17859 17860 17861 17862 17863 17864 17865 17866 17867 17868 17869 17870 17871 17872 17873 17874 17875 17876 17877 17878 17879 17880 17881 17882 17883 17884 17885 17886 17887 17888 17889 17890 17891 17892 17893 17894 17895 17896 17897 17898 17899 17900 17901 17902 17903 17904 17905 17906 17907 17908 17909 17910 17911 17912 17913 17914 17915 17916 17917 17918 17919 17920 17921 17922 17923 17924 17925 17926 17927 17928 17929 17930 17931 17932 17933 17934 17935 17936 17937 17938 17939 17940 17941 17942 17943 17944 17945 17946 17947 17948 17949 17950 17951 17952 17953 17954 17955 17956 17957 17958 17959 17960 17961 17962 17963 17964 17965 17966 17967 17968 17969 17970 17971 17972 17973 17974 17975 17976 17977 17978 17979 17980 17981 17982 17983 17984 17985 17986 17987 17988 17989 17990 17991 17992 17993 17994 17995 17996 17997 17998 17999 18000 18001 18002 18003 18004 18005 18006 18007 18008 18009 18010 18011 18012 18013 18014 18015 18016 18017 18018 18019 18020 18021 18022 18023 18024 18025 18026 18027 18028 18029 18030 18031 18032 18033 18034 18035 18036 18037 18038 18039 18040 18041 18042 18043 18044 18045 18046 18047 18048 18049 18050 18051 18052 18053 18054 18055 18056 18057 18058 18059 18060 18061 18062 18063 18064 18065 18066 18067 18068 18069 18070 18071 18072 18073 18074 18075 18076 18077 18078 18079 18080 18081 18082 18083 18084 18085 18086 18087 18088 18089 18090 18091 18092 18093 18094 18095 18096 18097 18098 18099 18100 18101 18102 18103 18104 18105 18106 18107 18108 18109 18110 18111 18112 18113 18114 18115 18116 18117 18118 18119 18120 18121 18122 18123 18124 18125 18126 18127 18128 18129 18130 18131 18132 18133 18134 18135 18136 18137 18138 18139 18140 18141 18142 18143 18144 18145 18146 18147 18148 18149 18150 18151 18152 18153 18154 18155 18156 18157 18158 18159 18160 18161 18162 18163 18164 18165 18166 18167 18168 18169 18170 18171 18172 18173 18174 18175 18176 18177 18178 18179 18180 18181 18182 18183 18184 18185 18186 18187 18188 18189 18190 18191 18192 18193 18194 18195 18196 18197 18198 18199 18200 18201 18202 18203 18204 18205 18206 18207 18208 18209 18210 18211 18212 18213 18214 18215 18216 18217 18218 18219 18220 18221 18222 18223 18224 18225 18226 18227 18228 18229 18230 18231 18232 18233 18234 18235 18236 18237 18238 18239 18240 18241 18242 18243 18244 18245 18246 18247 18248 18249 18250 18251 18252 18253 18254 18255 18256 18257 18258 18259 18260 18261 18262 18263 18264 18265 18266 18267 18268 18269 18270 18271 18272 18273 18274 18275 18276 18277 18278 18279 18280 18281 18282 18283 18284 18285 18286 18287 18288 18289 18290 18291 18292 18293 18294 18295 18296 18297 18298 18299 18300 18301 18302 18303 18304 18305 18306 18307 18308 18309 18310 18311 18312 18313 18314 18315 18316 18317 18318 18319 18320 18321 18322 18323 18324 18325 18326 18327 18328 18329 18330 18331 18332 18333 18334 18335 18336 18337 18338 18339 18340 18341 18342 18343 18344 18345 18346 18347 18348 18349 18350 18351 18352 18353 18354 18355 18356 18357 18358 18359 18360 18361 18362 18363 18364 18365 18366 18367 18368 18369 18370 18371 18372 18373 18374 18375 18376 18377 18378 18379 18380 18381 18382 18383 18384 18385 18386 18387 18388 18389 18390 18391 18392 18393 18394 18395 18396 18397 18398 18399 18400 18401 18402 18403 18404 18405 18406 18407 18408 18409 18410 18411 18412 18413 18414 18415 18416 18417 18418 18419 18420 18421 18422 18423 18424 18425 18426 18427 18428 18429 18430 18431 18432 18433 18434 18435 18436 18437 18438 18439 18440 18441 18442 18443 18444 18445 18446 18447 18448 18449 18450 18451 18452 18453 18454 18455 18456 18457 18458 18459 18460 18461 18462 18463 18464 18465 18466 18467 18468 18469 18470 18471 18472 18473 18474 18475 18476 18477 18478 18479 18480 18481 18482 18483 18484 18485 18486 18487 18488 18489 18490 18491 18492 18493 18494 18495 18496 18497 18498 18499 18500 18501 18502 18503 18504 18505 18506 18507 18508 18509 18510 18511 18512 18513 18514 18515 18516 18517 18518 18519 18520 18521 18522 18523 18524 18525 18526 18527 18528 18529 18530 18531 18532 18533 18534 18535 18536 18537 18538 18539 18540 18541 18542 18543 18544 18545 18546 18547 18548 18549 18550 18551 18552 18553 18554 18555 18556 18557 18558 18559 18560 18561 18562 18563 18564 18565 18566 18567 18568 18569 18570 18571 18572 18573 18574 18575 18576 18577 18578 18579 18580 18581 18582 18583 18584 18585 18586 18587 18588 18589 18590 18591 18592 18593 18594 18595 18596 18597 18598 18599 18600 18601 18602 18603 18604 18605 18606 18607 18608 18609 18610 18611 18612 18613 18614 18615 18616 18617 18618 18619 18620 18621 18622 18623 18624 18625 18626 18627 18628 18629 18630 18631 18632 18633 18634 18635 18636 18637 18638 18639 18640 18641 18642 18643 18644 18645 18646 18647 18648 18649 18650 18651 18652 18653 18654 18655 18656 18657 18658 18659 18660 18661 18662 18663 18664 18665 18666 18667 18668 18669 18670 18671 18672 18673 18674 18675 18676 18677 18678 18679 18680 18681 18682 18683 18684 18685 18686 18687 18688 18689 18690 18691 18692 18693 18694 18695 18696 18697 18698 18699 18700 18701 18702 18703 18704 18705 18706 18707 18708 18709 18710 18711 18712 18713 18714 18715 18716 18717 18718 18719 18720 18721 18722 18723 18724 18725 18726 18727 18728 18729 18730 18731 18732 18733 18734 18735 18736 18737 18738 18739 18740 18741 18742 18743 18744 18745 18746 18747 18748 18749 18750 18751 18752 18753 18754 18755 18756 18757 18758 18759 18760 18761 18762 18763 18764 18765 18766 18767 18768 18769 18770 18771 18772 18773 18774 18775 18776 18777 18778 18779 18780 18781 18782 18783 18784 18785 18786 18787 18788 18789 18790 18791 18792 18793 18794 18795 18796 18797 18798 18799 18800 18801 18802 18803 18804 18805 18806 18807 18808 18809 18810 18811 18812 18813 18814 18815 18816 18817 18818 18819 18820 18821 18822 18823 18824 18825 18826 18827 18828 18829 18830 18831 18832 18833 18834 18835 18836 18837 18838 18839 18840 18841 18842 18843 18844 18845 18846 18847 18848 18849 18850 18851 18852 18853 18854 18855 18856 18857 18858 18859 18860 18861 18862 18863 18864 18865 18866 18867 18868 18869 18870 18871 18872 18873 18874 18875 18876 18877 18878 18879 18880 18881 18882 18883 18884 18885 18886 18887 18888 18889 18890 18891 18892 18893 18894 18895 18896 18897 18898 18899 18900 18901 18902 18903 18904 18905 18906 18907 18908 18909 18910 18911 18912 18913 18914 18915 18916 18917 18918 18919 18920 18921 18922 18923 18924 18925 18926 18927 18928 18929 18930 18931 18932 18933 18934 18935 18936 18937 18938 18939 18940 18941 18942 18943 18944 18945 18946 18947 18948 18949 18950 18951 18952 18953 18954 18955 18956 18957 18958 18959 18960 18961 18962 18963 18964 18965 18966 18967 18968 18969 18970 18971 18972 18973 18974 18975 18976 18977 18978 18979 18980 18981 18982 18983 18984 18985 18986 18987 18988 18989 18990 18991 18992 18993 18994 18995 18996 18997 18998 18999 19000 19001 19002 19003 19004 19005 19006 19007 19008 19009 19010 19011 19012 19013 19014 19015 19016 19017 19018 19019 19020 19021 19022 19023 19024 19025 19026 19027 19028 19029 19030 19031 19032 19033 19034 19035 19036 19037 19038 19039 19040 19041 19042 19043 19044 19045 19046 19047 19048 19049 19050 19051 19052 19053 19054 19055 19056 19057 19058 19059 19060 19061 19062 19063 19064 19065 19066 19067 19068 19069 19070 19071 19072 19073 19074 19075 19076 19077 19078 19079 19080 19081 19082 19083 19084 19085 19086 19087 19088 19089 19090 19091 19092 19093 19094 19095 19096 19097 19098 19099 19100 19101 19102 19103 19104 19105 19106 19107 19108 19109 19110 19111 19112 19113 19114 19115 19116 19117 19118 19119 19120 19121 19122 19123 19124 19125 19126 19127 19128 19129 19130 19131 19132 19133 19134 19135 19136 19137 19138 19139 19140 19141 19142 19143 19144 19145 19146 19147 19148 19149 19150 19151 19152 19153 19154 19155 19156 19157 19158 19159 19160 19161 19162 19163 19164 19165 19166 19167 19168 19169 19170 19171 19172 19173 19174 19175 19176 19177 19178 19179 19180 19181 19182 19183 19184 19185 19186 19187 19188 19189 19190 19191 19192 19193 19194 19195 19196 19197 19198 19199 19200 19201 19202 19203 19204 19205 19206 19207 19208 19209 19210 19211 19212 19213 19214 19215 19216 19217 19218 19219 19220 19221 19222 19223 19224 19225 19226 19227 19228 19229 19230 19231 19232 19233 19234 19235 19236 19237 19238 19239 19240 19241 19242 19243 19244 19245 19246 19247 19248 19249 19250 19251 19252 19253 19254 19255 19256 19257 19258 19259 19260 19261 19262 19263 19264 19265 19266 19267 19268 19269 19270 19271 19272 19273 19274 19275 19276 19277 19278 19279 19280 19281 19282 19283 19284 19285 19286 19287 19288 19289 19290 19291 19292 19293 19294 19295 19296 19297 19298 19299 19300 19301 19302 19303 19304 19305 19306 19307 19308 19309 19310 19311 19312 19313 19314 19315 19316 19317 19318 19319 19320 19321 19322 19323 19324 19325 19326 19327 19328 19329 19330 19331 19332 19333 19334 19335 19336 19337 19338 19339 19340 19341 19342 19343 19344 19345 19346 19347 19348 19349 19350 19351 19352 19353 19354 19355 19356 19357 19358 19359 19360 19361 19362 19363 19364 19365 19366 19367 19368 19369 19370 19371 19372 19373 19374 19375 19376 19377 19378 19379 19380 19381 19382 19383 19384 19385 19386 19387 19388 19389 19390 19391 19392 19393 19394 19395 19396 19397 19398 19399 19400 19401 19402 19403 19404 19405 19406 19407 19408 19409 19410 19411 19412 19413 19414 19415 19416 19417 19418 19419 19420 19421 19422 19423 19424 19425 19426 19427 19428 19429 19430 19431 19432 19433 19434 19435 19436 19437 19438 19439 19440 19441 19442 19443 19444 19445 19446 19447 19448 19449 19450 19451 19452 19453 19454 19455 19456 19457 19458 19459 19460 19461 19462 19463 19464 19465 19466 19467 19468 19469 19470 19471 19472 19473 19474 19475 19476 19477 19478 19479 19480 19481 19482 19483 19484 19485 19486 19487 19488 19489 19490 19491 19492 19493 19494 19495 19496 19497 19498 19499 19500 19501 19502 19503 19504 19505 19506 19507 19508 19509 19510 19511 19512 19513 19514 19515 19516 19517 19518 19519 19520 19521 19522 19523 19524 19525 19526 19527 19528 19529 19530 19531 19532 19533 19534 19535 19536 19537 19538 19539 19540 19541 19542 19543 19544 19545 19546 19547 19548 19549 19550 19551 19552 19553 19554 19555 19556 19557 19558 19559 19560 19561 19562 19563 19564 19565 19566 19567 19568 19569 19570 19571 19572 19573 19574 19575 19576 19577 19578 19579 19580 19581 19582 19583 19584 19585 19586 19587 19588 19589 19590 19591 19592 19593 19594 19595 19596 19597 19598 19599 19600 19601 19602 19603 19604 19605 19606 19607 19608 19609 19610 19611 19612 19613 19614 19615 19616 19617 19618 19619 19620 19621 19622 19623 19624 19625 19626 19627 19628 19629 19630 19631 19632
//! Generated by `cargo codegen lint-definitions`, do not edit by hand.

use span::Edition;

use crate::Severity;

#[derive(Clone)]
pub struct Lint {
    pub label: &'static str,
    pub description: &'static str,
    pub default_severity: Severity,
    pub warn_since: Option<Edition>,
    pub deny_since: Option<Edition>,
}

pub struct LintGroup {
    pub lint: Lint,
    pub children: &'static [&'static str],
}

pub const DEFAULT_LINTS: &[Lint] = &[
    Lint {
        label: "abi_unsupported_vector_types",
        description: r##"this function call or definition uses a vector type which is not enabled"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "absolute_paths_not_starting_with_crate",
        description: r##"fully qualified paths that start with a module name instead of `crate`, `self`, or an extern crate name"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ambiguous_associated_items",
        description: r##"ambiguous associated items"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ambiguous_glob_imports",
        description: r##"detects certain glob imports that require reporting an ambiguity error"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ambiguous_glob_reexports",
        description: r##"ambiguous glob re-exports"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ambiguous_negative_literals",
        description: r##"ambiguous negative literals operations"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ambiguous_wide_pointer_comparisons",
        description: r##"detects ambiguous wide pointer comparisons"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "anonymous_parameters",
        description: r##"detects anonymous parameters"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "arithmetic_overflow",
        description: r##"arithmetic operation overflows"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_into_iter",
        description: r##"detects calling `into_iter` on arrays in Rust 2015 and 2018"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_sub_register",
        description: r##"using only a subset of a register for inline asm inputs"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_fn_in_trait",
        description: r##"use of `async fn` in definition of a publicly-reachable trait"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bad_asm_style",
        description: r##"incorrect use of inline assembly"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bare_trait_objects",
        description: r##"suggest using `dyn Trait` for trait objects"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "binary_asm_labels",
        description: r##"labels in inline assembly containing only 0 or 1 digits"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bindings_with_variant_name",
        description: r##"detects pattern bindings with the same name as one of the matched variants"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "boxed_slice_into_iter",
        description: r##"detects calling `into_iter` on boxed slices in Rust 2015, 2018, and 2021"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "break_with_label_and_loop",
        description: r##"`break` expression with label and unlabeled loop as value expression"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cenum_impl_drop_cast",
        description: r##"a C-like enum implementing Drop is cast"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clashing_extern_declarations",
        description: r##"detects when an extern fn has been declared with the same name but different types"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "closure_returning_async_block",
        description: r##"closure that returns `async {}` could be rewritten as an async closure"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coherence_leak_check",
        description: r##"distinct impls distinguished only by the leak-check code"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "conflicting_repr_hints",
        description: r##"conflicts between `#[repr(..)]` hints that were previously accepted and used in practice"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "confusable_idents",
        description: r##"detects visually confusable pairs between identifiers"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_evaluatable_unchecked",
        description: r##"detects a generic constant is used in a type without a emitting a warning"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_item_mutation",
        description: r##"detects attempts to mutate a `const` item"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dangling_pointers_from_temporaries",
        description: r##"detects getting a pointer from a temporary"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dead_code",
        description: r##"detect unused, unexported items"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dependency_on_unit_never_type_fallback",
        description: r##"never type fallback affecting unsafe function calls"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated",
        description: r##"detects use of deprecated items"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_in_future",
        description: r##"detects use of items that will be deprecated in a future version"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_safe_2024",
        description: r##"detects unsafe functions being used as safe functions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_where_clause_location",
        description: r##"deprecated where clause location"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deref_into_dyn_supertrait",
        description: r##"`Deref` implementation usage with a supertrait trait object for output might be shadowed in the future"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deref_nullptr",
        description: r##"detects when an null pointer is dereferenced"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "drop_bounds",
        description: r##"bounds of the form `T: Drop` are most likely incorrect"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dropping_copy_types",
        description: r##"calls to `std::mem::drop` with a value that implements Copy"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dropping_references",
        description: r##"calls to `std::mem::drop` with a reference instead of an owned value"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "duplicate_macro_attributes",
        description: r##"duplicated attribute"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dyn_drop",
        description: r##"trait objects of the form `dyn Drop` are useless"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "edition_2024_expr_fragment_specifier",
        description: r##"The `expr` fragment specifier will accept more expressions in the 2024 edition. To keep the existing behavior, use the `expr_2021` fragment specifier."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "elided_lifetimes_in_associated_constant",
        description: r##"elided lifetimes cannot be used in associated constants in impls"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "elided_lifetimes_in_paths",
        description: r##"hidden lifetime parameters in types are deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "elided_named_lifetimes",
        description: r##"detects when an elided lifetime gets resolved to be `'static` or some named parameter"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ellipsis_inclusive_range_patterns",
        description: r##"`...` range patterns are deprecated"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "enum_intrinsics_non_enums",
        description: r##"detects calls to `core::mem::discriminant` and `core::mem::variant_count` with non-enum types"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "explicit_builtin_cfgs_in_flags",
        description: r##"detects builtin cfgs set via the `--cfg`"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "explicit_outlives_requirements",
        description: r##"outlives requirements can be inferred"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exported_private_dependencies",
        description: r##"public interface leaks type from a private dependency"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ffi_unwind_calls",
        description: r##"call to foreign functions or function pointers with FFI-unwind ABI"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "for_loops_over_fallibles",
        description: r##"for-looping over an `Option` or a `Result`, which is more clearly expressed as an `if let`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "forbidden_lint_groups",
        description: r##"applying forbid to lint-groups"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "forgetting_copy_types",
        description: r##"calls to `std::mem::forget` with a value that implements Copy"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "forgetting_references",
        description: r##"calls to `std::mem::forget` with a reference instead of an owned value"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "function_item_references",
        description: r##"suggest casting to a function pointer when attempting to take references to function items"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fuzzy_provenance_casts",
        description: r##"a fuzzy integer to pointer cast is used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hidden_glob_reexports",
        description: r##"name introduced by a private item shadows a name introduced by a public glob re-export"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "if_let_rescope",
        description: r##"`if let` assigns a shorter lifetime to temporary values being pattern-matched against in Edition 2024 and rewriting in `match` is an option to preserve the semantics up to Edition 2021"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ill_formed_attribute_input",
        description: r##"ill-formed attribute inputs that were previously accepted and used in practice"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "impl_trait_overcaptures",
        description: r##"`impl Trait` will capture more lifetimes than possibly intended in edition 2024"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "impl_trait_redundant_captures",
        description: r##"redundant precise-capturing `use<...>` syntax on an `impl Trait`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "improper_ctypes",
        description: r##"proper use of libc types in foreign modules"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "improper_ctypes_definitions",
        description: r##"proper use of libc types in foreign item definitions"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "incomplete_features",
        description: r##"incomplete features that may function improperly in some or all cases"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "incomplete_include",
        description: r##"trailing content in included file"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ineffective_unstable_trait_impl",
        description: r##"detects `#[unstable]` on stable trait implementations for stable types"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "inline_no_sanitize",
        description: r##"detects incompatible use of `#[inline(always)]` and `#[no_sanitize(...)]`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "internal_features",
        description: r##"internal features are not supposed to be used"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_atomic_ordering",
        description: r##"usage of invalid atomic ordering in atomic operations and memory fences"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_doc_attributes",
        description: r##"detects invalid `#[doc(...)]` attributes"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_from_utf8",
        description: r##"using a non UTF-8 literal in `std::str::from_utf8`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_from_utf8_unchecked",
        description: r##"using a non UTF-8 literal in `std::str::from_utf8_unchecked`"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_macro_export_arguments",
        description: r##""invalid_parameter" isn't a valid argument for `#[macro_export]`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_nan_comparisons",
        description: r##"detects invalid floating point NaN comparisons"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_reference_casting",
        description: r##"casts of `&T` to `&mut T` without interior mutability"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_type_param_default",
        description: r##"type parameter default erroneously allowed in invalid location"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "invalid_value",
        description: r##"an invalid value is being created (such as a null reference)"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "irrefutable_let_patterns",
        description: r##"detects irrefutable patterns in `if let` and `while let` statements"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "keyword_idents_2018",
        description: r##"detects edition keywords being used as an identifier"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "keyword_idents_2024",
        description: r##"detects edition keywords being used as an identifier"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "large_assignments",
        description: r##"detects large moves or copies"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "late_bound_lifetime_arguments",
        description: r##"detects generic lifetime arguments in path segments with late bound lifetime parameters"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "legacy_derive_helpers",
        description: r##"detects derive helper attributes that are used before they are introduced"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "let_underscore_drop",
        description: r##"non-binding let on a type that has a destructor"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "let_underscore_lock",
        description: r##"non-binding let on a synchronization lock"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "long_running_const_eval",
        description: r##"detects long const eval operations"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lossy_provenance_casts",
        description: r##"a lossy pointer to integer cast is used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "macro_expanded_macro_exports_accessed_by_absolute_paths",
        description: r##"macro-expanded `macro_export` macros from the current crate cannot be referred to by absolute paths"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "macro_use_extern_crate",
        description: r##"the `#[macro_use]` attribute is now deprecated in favor of using macros via the module system"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "map_unit_fn",
        description: r##"`Iterator::map` call that discard the iterator's values"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "meta_variable_misuse",
        description: r##"possible meta-variable misuse at macro definition"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_abi",
        description: r##"No declared ABI for extern declaration"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_copy_implementations",
        description: r##"detects potentially-forgotten implementations of `Copy`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_debug_implementations",
        description: r##"detects missing implementations of Debug"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_docs",
        description: r##"detects missing documentation for public members"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_fragment_specifier",
        description: r##"detects missing fragment specifiers in unused `macro_rules!` patterns"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "missing_unsafe_on_extern",
        description: r##"detects missing unsafe keyword on extern declarations"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mixed_script_confusables",
        description: r##"detects Unicode scripts whose mixed script confusables codepoints are solely used"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "multiple_supertrait_upcastable",
        description: r##"detect when a dyn-compatible trait has multiple supertraits"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "must_not_suspend",
        description: r##"use of a `#[must_not_suspend]` value across a yield point"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mutable_transmutes",
        description: r##"transmuting &T to &mut T is undefined behavior, even if the reference is unused"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "named_arguments_used_positionally",
        description: r##"named arguments in format used positionally"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "named_asm_labels",
        description: r##"named labels in inline assembly"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "never_type_fallback_flowing_into_unsafe",
        description: r##"never type fallback affecting unsafe function calls"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: Some(Edition::Edition2024),
    },
    Lint {
        label: "no_mangle_const_items",
        description: r##"const items will not have their symbols exported"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "no_mangle_generic_items",
        description: r##"generic items must be mangled"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_ascii_idents",
        description: r##"detects non-ASCII identifiers"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_camel_case_types",
        description: r##"types, variants, traits and type parameters should have camel case names"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_contiguous_range_endpoints",
        description: r##"detects off-by-one errors with exclusive range patterns"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_exhaustive_omitted_patterns",
        description: r##"detect when patterns of types marked `non_exhaustive` are missed"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_fmt_panics",
        description: r##"detect single-argument panic!() invocations in which the argument is not a format string"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_local_definitions",
        description: r##"checks for non-local definitions"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_shorthand_field_patterns",
        description: r##"using `Struct { x: x }` instead of `Struct { x }` in a pattern"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_snake_case",
        description: r##"variables, methods, functions, lifetime parameters and modules should have snake case names"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_upper_case_globals",
        description: r##"static constants should have uppercase identifiers"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "noop_method_call",
        description: r##"detects the use of well-known noop methods"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "opaque_hidden_inferred_bound",
        description: r##"detects the use of nested `impl Trait` types in associated type bounds that are not general enough"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "order_dependent_trait_objects",
        description: r##"trait-object types were treated as different depending on marker-trait order"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "out_of_scope_macro_calls",
        description: r##"detects out of scope calls to `macro_rules` in key-value attributes"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "overflowing_literals",
        description: r##"literal out of range for its type"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "overlapping_range_endpoints",
        description: r##"detects range patterns with overlapping endpoints"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "path_statements",
        description: r##"path statements with no effect"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "patterns_in_fns_without_body",
        description: r##"patterns in functions without body were erroneously allowed"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "private_bounds",
        description: r##"private type in secondary interface of an item"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "private_interfaces",
        description: r##"private type in primary interface of an item"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_derive_resolution_fallback",
        description: r##"detects proc macro derives using inaccessible names from parent modules"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_cast_add_auto_to_object",
        description: r##"detects `as` casts from pointers to `dyn Trait` to pointers to `dyn Trait + Auto`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_to_integer_transmute_in_consts",
        description: r##"detects pointer to integer transmutes in const functions and associated constants"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pub_use_of_private_extern_crate",
        description: r##"detect public re-exports of private extern crates"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "redundant_imports",
        description: r##"imports that are redundant due to being imported already"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "redundant_lifetimes",
        description: r##"detects lifetime parameters that are redundant because they are equal to some other named lifetime"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "redundant_semicolons",
        description: r##"detects unnecessary trailing semicolons"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "refining_impl_trait_internal",
        description: r##"impl trait in impl method signature does not match trait method signature"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "refining_impl_trait_reachable",
        description: r##"impl trait in impl method signature does not match trait method signature"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "renamed_and_removed_lints",
        description: r##"lints that have been renamed or removed"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "repr_transparent_external_private_fields",
        description: r##"transparent type contains an external ZST that is marked #[non_exhaustive] or contains private fields"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2021_incompatible_closure_captures",
        description: r##"detects closures affected by Rust 2021 changes"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2021_incompatible_or_patterns",
        description: r##"detects usage of old versions of or-patterns"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2021_prefixes_incompatible_syntax",
        description: r##"identifiers that will be parsed as a prefix in Rust 2021"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2021_prelude_collisions",
        description: r##"detects the usage of trait methods which are ambiguous with traits added to the prelude in future editions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2024_guarded_string_incompatible_syntax",
        description: r##"will be parsed as a guarded string in Rust 2024"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2024_incompatible_pat",
        description: r##"detects patterns whose meaning will change in Rust 2024"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2024_prelude_collisions",
        description: r##"detects the usage of trait methods which are ambiguous with traits added to the prelude in future editions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "self_constructor_from_outer_item",
        description: r##"detect unsupported use of `Self` from outer item"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "semicolon_in_expressions_from_macros",
        description: r##"trailing semicolon in macro body used as expression"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "single_use_lifetimes",
        description: r##"detects lifetime parameters that are only used once"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "soft_unstable",
        description: r##"a feature gate that doesn't break dependent crates"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "special_module_name",
        description: r##"module declarations for files with a special meaning"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stable_features",
        description: r##"stable features found in `#[feature]` directive"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "static_mut_refs",
        description: r##"shared references or mutable references of mutable static is discouraged"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: Some(Edition::Edition2024),
    },
    Lint {
        label: "suspicious_double_ref_op",
        description: r##"suspicious call of trait method on `&&T`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tail_expr_drop_order",
        description: r##"Detect and warn on significant change in drop order in tail expression location"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "test_unstable_lint",
        description: r##"this unstable lint is only for testing"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "text_direction_codepoint_in_comment",
        description: r##"invisible directionality-changing codepoints in comment"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "text_direction_codepoint_in_literal",
        description: r##"detect special Unicode codepoints that affect the visual representation of text on screen, changing the direction in which text flows"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trivial_bounds",
        description: r##"these bounds don't depend on an type parameters"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trivial_casts",
        description: r##"detects trivial casts which could be removed"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trivial_numeric_casts",
        description: r##"detects trivial casts of numeric types which could be removed"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "type_alias_bounds",
        description: r##"bounds in type aliases are not enforced"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tyvar_behind_raw_pointer",
        description: r##"raw pointer to an inference variable"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "uncommon_codepoints",
        description: r##"detects uncommon Unicode codepoints in identifiers"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unconditional_panic",
        description: r##"operation will cause a panic at runtime"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unconditional_recursion",
        description: r##"functions that cannot return without calling themselves"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "uncovered_param_in_projection",
        description: r##"impl contains type parameters that are not covered"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "undefined_naked_function_abi",
        description: r##"undefined naked function ABI"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "undropped_manually_drops",
        description: r##"calls to `std::mem::drop` with `std::mem::ManuallyDrop` instead of it's inner value"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unexpected_cfgs",
        description: r##"detects unexpected names and values in `#[cfg]` conditions"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unfulfilled_lint_expectations",
        description: r##"unfulfilled lint expectation"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ungated_async_fn_track_caller",
        description: r##"enabling track_caller on an async fn is a no-op unless the async_fn_track_caller feature is enabled"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "uninhabited_static",
        description: r##"uninhabited static"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unit_bindings",
        description: r##"binding is useless because it has the unit `()` type"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unknown_crate_types",
        description: r##"unknown crate type found in `#[crate_type]` directive"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unknown_lints",
        description: r##"unrecognized lint attribute"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unknown_or_malformed_diagnostic_attributes",
        description: r##"unrecognized or malformed diagnostic attribute"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unnameable_test_items",
        description: r##"detects an item that cannot be named being marked as `#[test_case]`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unnameable_types",
        description: r##"effective visibility of a type is larger than the area in which it can be named"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unqualified_local_imports",
        description: r##"`use` of a local item without leading `self::`, `super::`, or `crate::`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unreachable_code",
        description: r##"detects unreachable code paths"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unreachable_patterns",
        description: r##"detects unreachable patterns"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unreachable_pub",
        description: r##"`pub` items not reachable from crate root"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsafe_attr_outside_unsafe",
        description: r##"detects unsafe attributes outside of unsafe"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsafe_code",
        description: r##"usage of `unsafe` code and other potentially unsound constructs"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsafe_op_in_unsafe_fn",
        description: r##"unsafe operations in unsafe functions without an explicit unsafe block are deprecated"##,
        default_severity: Severity::Allow,
        warn_since: Some(Edition::Edition2024),
        deny_since: None,
    },
    Lint {
        label: "unstable_features",
        description: r##"enabling unstable features"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unstable_name_collisions",
        description: r##"detects name collision with an existing but unstable method"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unstable_syntax_pre_expansion",
        description: r##"unstable syntax can change at any point in the future, causing a hard error!"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsupported_fn_ptr_calling_conventions",
        description: r##"use of unsupported calling convention for function pointer"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_allocation",
        description: r##"detects unnecessary allocations that can be eliminated"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_assignments",
        description: r##"detect assignments that will never be read"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_associated_type_bounds",
        description: r##"detects unused `Foo = Bar` bounds in `dyn Trait<Foo = Bar>`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_attributes",
        description: r##"detects attributes that were not used by the compiler"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_braces",
        description: r##"unnecessary braces around an expression"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_comparisons",
        description: r##"comparisons made useless by limits of the types involved"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_crate_dependencies",
        description: r##"crate dependencies that are never used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_doc_comments",
        description: r##"detects doc comments that aren't used by rustdoc"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_extern_crates",
        description: r##"extern crates that are never used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_features",
        description: r##"unused features found in crate-level `#[feature]` directives"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_import_braces",
        description: r##"unnecessary braces around an imported item"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_imports",
        description: r##"imports that are never used"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_labels",
        description: r##"detects labels that are never used"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_lifetimes",
        description: r##"detects lifetime parameters that are never used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_macro_rules",
        description: r##"detects macro rules that were not used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_macros",
        description: r##"detects macros that were not used"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_must_use",
        description: r##"unused result of a type flagged as `#[must_use]`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_mut",
        description: r##"detect mut variables which don't need to be mutable"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_parens",
        description: r##"`if`, `match`, `while` and `return` do not need parentheses"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_qualifications",
        description: r##"detects unnecessarily qualified names"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_results",
        description: r##"unused result of an expression in a statement"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_unsafe",
        description: r##"unnecessary use of an `unsafe` block"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused_variables",
        description: r##"detect variables which are not used in any way"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "useless_deprecated",
        description: r##"detects deprecation attributes with no effect"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "useless_ptr_null_checks",
        description: r##"useless checking of non-null-typed pointer"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "variant_size_differences",
        description: r##"detects enums with widely varying variant sizes"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "warnings",
        description: r##"mass-change the level for lints which produce warnings"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "wasm_c_abi",
        description: r##"detects dependencies that are incompatible with the Wasm C ABI"##,
        default_severity: Severity::Error,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "while_true",
        description: r##"suggest using `loop { }` instead of `while true { }`"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_safe",
        description: r##"lint group for: deprecated-safe-2024"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "future_incompatible",
        description: r##"lint group for: deref-into-dyn-supertrait, abi-unsupported-vector-types, ambiguous-associated-items, ambiguous-glob-imports, cenum-impl-drop-cast, coherence-leak-check, conflicting-repr-hints, const-evaluatable-unchecked, elided-lifetimes-in-associated-constant, forbidden-lint-groups, ill-formed-attribute-input, invalid-type-param-default, late-bound-lifetime-arguments, legacy-derive-helpers, macro-expanded-macro-exports-accessed-by-absolute-paths, missing-fragment-specifier, order-dependent-trait-objects, out-of-scope-macro-calls, patterns-in-fns-without-body, proc-macro-derive-resolution-fallback, ptr-cast-add-auto-to-object, pub-use-of-private-extern-crate, repr-transparent-external-private-fields, self-constructor-from-outer-item, semicolon-in-expressions-from-macros, soft-unstable, uncovered-param-in-projection, uninhabited-static, unstable-name-collisions, unstable-syntax-pre-expansion, unsupported-fn-ptr-calling-conventions, wasm-c-abi"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "keyword_idents",
        description: r##"lint group for: keyword-idents-2018, keyword-idents-2024"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "let_underscore",
        description: r##"lint group for: let-underscore-drop, let-underscore-lock"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "nonstandard_style",
        description: r##"lint group for: non-camel-case-types, non-snake-case, non-upper-case-globals"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "refining_impl_trait",
        description: r##"lint group for: refining-impl-trait-reachable, refining-impl-trait-internal"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2018_compatibility",
        description: r##"lint group for: keyword-idents-2018, anonymous-parameters, absolute-paths-not-starting-with-crate, tyvar-behind-raw-pointer"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2018_idioms",
        description: r##"lint group for: bare-trait-objects, unused-extern-crates, ellipsis-inclusive-range-patterns, elided-lifetimes-in-paths, explicit-outlives-requirements"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2021_compatibility",
        description: r##"lint group for: ellipsis-inclusive-range-patterns, array-into-iter, non-fmt-panics, bare-trait-objects, rust-2021-incompatible-closure-captures, rust-2021-incompatible-or-patterns, rust-2021-prefixes-incompatible-syntax, rust-2021-prelude-collisions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_2024_compatibility",
        description: r##"lint group for: keyword-idents-2024, edition-2024-expr-fragment-specifier, boxed-slice-into-iter, impl-trait-overcaptures, if-let-rescope, static-mut-refs, dependency-on-unit-never-type-fallback, deprecated-safe-2024, missing-unsafe-on-extern, never-type-fallback-flowing-into-unsafe, rust-2024-guarded-string-incompatible-syntax, rust-2024-incompatible-pat, rust-2024-prelude-collisions, tail-expr-drop-order, unsafe-attr-outside-unsafe, unsafe-op-in-unsafe-fn"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unused",
        description: r##"lint group for: unused-imports, unused-variables, unused-assignments, dead-code, unused-mut, unreachable-code, unreachable-patterns, unused-must-use, unused-unsafe, path-statements, unused-attributes, unused-macros, unused-macro-rules, unused-allocation, unused-doc-comments, unused-extern-crates, unused-features, unused-labels, unused-parens, unused-braces, redundant-semicolons, map-unit-fn"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "warnings",
        description: r##"lint group for: all lints that are set to issue warnings"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
];

pub const DEFAULT_LINT_GROUPS: &[LintGroup] = &[
    LintGroup {
        lint: Lint {
            label: "deprecated_safe",
            description: r##"lint group for: deprecated-safe-2024"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &["deprecated_safe_2024"],
    },
    LintGroup {
        lint: Lint {
            label: "future_incompatible",
            description: r##"lint group for: deref-into-dyn-supertrait, abi-unsupported-vector-types, ambiguous-associated-items, ambiguous-glob-imports, cenum-impl-drop-cast, coherence-leak-check, conflicting-repr-hints, const-evaluatable-unchecked, elided-lifetimes-in-associated-constant, forbidden-lint-groups, ill-formed-attribute-input, invalid-type-param-default, late-bound-lifetime-arguments, legacy-derive-helpers, macro-expanded-macro-exports-accessed-by-absolute-paths, missing-fragment-specifier, order-dependent-trait-objects, out-of-scope-macro-calls, patterns-in-fns-without-body, proc-macro-derive-resolution-fallback, ptr-cast-add-auto-to-object, pub-use-of-private-extern-crate, repr-transparent-external-private-fields, self-constructor-from-outer-item, semicolon-in-expressions-from-macros, soft-unstable, uncovered-param-in-projection, uninhabited-static, unstable-name-collisions, unstable-syntax-pre-expansion, unsupported-fn-ptr-calling-conventions, wasm-c-abi"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "deref_into_dyn_supertrait",
            "abi_unsupported_vector_types",
            "ambiguous_associated_items",
            "ambiguous_glob_imports",
            "cenum_impl_drop_cast",
            "coherence_leak_check",
            "conflicting_repr_hints",
            "const_evaluatable_unchecked",
            "elided_lifetimes_in_associated_constant",
            "forbidden_lint_groups",
            "ill_formed_attribute_input",
            "invalid_type_param_default",
            "late_bound_lifetime_arguments",
            "legacy_derive_helpers",
            "macro_expanded_macro_exports_accessed_by_absolute_paths",
            "missing_fragment_specifier",
            "order_dependent_trait_objects",
            "out_of_scope_macro_calls",
            "patterns_in_fns_without_body",
            "proc_macro_derive_resolution_fallback",
            "ptr_cast_add_auto_to_object",
            "pub_use_of_private_extern_crate",
            "repr_transparent_external_private_fields",
            "self_constructor_from_outer_item",
            "semicolon_in_expressions_from_macros",
            "soft_unstable",
            "uncovered_param_in_projection",
            "uninhabited_static",
            "unstable_name_collisions",
            "unstable_syntax_pre_expansion",
            "unsupported_fn_ptr_calling_conventions",
            "wasm_c_abi",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "keyword_idents",
            description: r##"lint group for: keyword-idents-2018, keyword-idents-2024"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &["keyword_idents_2018", "keyword_idents_2024"],
    },
    LintGroup {
        lint: Lint {
            label: "let_underscore",
            description: r##"lint group for: let-underscore-drop, let-underscore-lock"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &["let_underscore_drop", "let_underscore_lock"],
    },
    LintGroup {
        lint: Lint {
            label: "nonstandard_style",
            description: r##"lint group for: non-camel-case-types, non-snake-case, non-upper-case-globals"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &["non_camel_case_types", "non_snake_case", "non_upper_case_globals"],
    },
    LintGroup {
        lint: Lint {
            label: "refining_impl_trait",
            description: r##"lint group for: refining-impl-trait-reachable, refining-impl-trait-internal"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &["refining_impl_trait_reachable", "refining_impl_trait_internal"],
    },
    LintGroup {
        lint: Lint {
            label: "rust_2018_compatibility",
            description: r##"lint group for: keyword-idents-2018, anonymous-parameters, absolute-paths-not-starting-with-crate, tyvar-behind-raw-pointer"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "keyword_idents_2018",
            "anonymous_parameters",
            "absolute_paths_not_starting_with_crate",
            "tyvar_behind_raw_pointer",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "rust_2018_idioms",
            description: r##"lint group for: bare-trait-objects, unused-extern-crates, ellipsis-inclusive-range-patterns, elided-lifetimes-in-paths, explicit-outlives-requirements"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "bare_trait_objects",
            "unused_extern_crates",
            "ellipsis_inclusive_range_patterns",
            "elided_lifetimes_in_paths",
            "explicit_outlives_requirements",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "rust_2021_compatibility",
            description: r##"lint group for: ellipsis-inclusive-range-patterns, array-into-iter, non-fmt-panics, bare-trait-objects, rust-2021-incompatible-closure-captures, rust-2021-incompatible-or-patterns, rust-2021-prefixes-incompatible-syntax, rust-2021-prelude-collisions"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "ellipsis_inclusive_range_patterns",
            "array_into_iter",
            "non_fmt_panics",
            "bare_trait_objects",
            "rust_2021_incompatible_closure_captures",
            "rust_2021_incompatible_or_patterns",
            "rust_2021_prefixes_incompatible_syntax",
            "rust_2021_prelude_collisions",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "rust_2024_compatibility",
            description: r##"lint group for: keyword-idents-2024, edition-2024-expr-fragment-specifier, boxed-slice-into-iter, impl-trait-overcaptures, if-let-rescope, static-mut-refs, dependency-on-unit-never-type-fallback, deprecated-safe-2024, missing-unsafe-on-extern, never-type-fallback-flowing-into-unsafe, rust-2024-guarded-string-incompatible-syntax, rust-2024-incompatible-pat, rust-2024-prelude-collisions, tail-expr-drop-order, unsafe-attr-outside-unsafe, unsafe-op-in-unsafe-fn"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "keyword_idents_2024",
            "edition_2024_expr_fragment_specifier",
            "boxed_slice_into_iter",
            "impl_trait_overcaptures",
            "if_let_rescope",
            "static_mut_refs",
            "dependency_on_unit_never_type_fallback",
            "deprecated_safe_2024",
            "missing_unsafe_on_extern",
            "never_type_fallback_flowing_into_unsafe",
            "rust_2024_guarded_string_incompatible_syntax",
            "rust_2024_incompatible_pat",
            "rust_2024_prelude_collisions",
            "tail_expr_drop_order",
            "unsafe_attr_outside_unsafe",
            "unsafe_op_in_unsafe_fn",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "unused",
            description: r##"lint group for: unused-imports, unused-variables, unused-assignments, dead-code, unused-mut, unreachable-code, unreachable-patterns, unused-must-use, unused-unsafe, path-statements, unused-attributes, unused-macros, unused-macro-rules, unused-allocation, unused-doc-comments, unused-extern-crates, unused-features, unused-labels, unused-parens, unused-braces, redundant-semicolons, map-unit-fn"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "unused_imports",
            "unused_variables",
            "unused_assignments",
            "dead_code",
            "unused_mut",
            "unreachable_code",
            "unreachable_patterns",
            "unused_must_use",
            "unused_unsafe",
            "path_statements",
            "unused_attributes",
            "unused_macros",
            "unused_macro_rules",
            "unused_allocation",
            "unused_doc_comments",
            "unused_extern_crates",
            "unused_features",
            "unused_labels",
            "unused_parens",
            "unused_braces",
            "redundant_semicolons",
            "map_unit_fn",
        ],
    },
];

pub const RUSTDOC_LINTS: &[Lint] = &[
    Lint {
        label: "rustdoc::bare_urls",
        description: r##"detects URLs that are not hyperlinks"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::broken_intra_doc_links",
        description: r##"failures in resolving intra-doc link targets"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::invalid_codeblock_attributes",
        description: r##"codeblock attribute looks a lot like a known one"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::invalid_html_tags",
        description: r##"detects invalid HTML tags in doc comments"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::invalid_rust_codeblocks",
        description: r##"codeblock could not be parsed as valid Rust or is empty"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::missing_crate_level_docs",
        description: r##"detects crates with no crate-level documentation"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::missing_doc_code_examples",
        description: r##"detects publicly-exported items without code samples in their documentation"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::private_doc_tests",
        description: r##"detects code samples in docs of private items not documented by rustdoc"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::private_intra_doc_links",
        description: r##"linking from a public item to a private one"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::redundant_explicit_links",
        description: r##"detects redundant explicit links in doc comments"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::unescaped_backticks",
        description: r##"detects unescaped backticks in doc comments"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::unportable_markdown",
        description: r##"detects markdown that is interpreted differently in different parser"##,
        default_severity: Severity::Warning,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc::all",
        description: r##"lint group for: rustdoc::broken-intra-doc-links, rustdoc::private-intra-doc-links, rustdoc::private-doc-tests, rustdoc::invalid-codeblock-attributes, rustdoc::invalid-rust-codeblocks, rustdoc::invalid-html-tags, rustdoc::bare-urls, rustdoc::missing-crate-level-docs, rustdoc::unescaped-backticks, rustdoc::redundant-explicit-links, rustdoc::unportable-markdown"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
];

pub const RUSTDOC_LINT_GROUPS: &[LintGroup] = &[LintGroup {
    lint: Lint {
        label: "rustdoc::all",
        description: r##"lint group for: rustdoc::broken-intra-doc-links, rustdoc::private-intra-doc-links, rustdoc::private-doc-tests, rustdoc::invalid-codeblock-attributes, rustdoc::invalid-rust-codeblocks, rustdoc::invalid-html-tags, rustdoc::bare-urls, rustdoc::missing-crate-level-docs, rustdoc::unescaped-backticks, rustdoc::redundant-explicit-links, rustdoc::unportable-markdown"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    children: &[
        "rustdoc::broken_intra_doc_links",
        "rustdoc::private_intra_doc_links",
        "rustdoc::private_doc_tests",
        "rustdoc::invalid_codeblock_attributes",
        "rustdoc::invalid_rust_codeblocks",
        "rustdoc::invalid_html_tags",
        "rustdoc::bare_urls",
        "rustdoc::missing_crate_level_docs",
        "rustdoc::unescaped_backticks",
        "rustdoc::redundant_explicit_links",
        "rustdoc::unportable_markdown",
    ],
}];

pub const FEATURES: &[Lint] = &[
    Lint {
        label: "aarch64_unstable_target_feature",
        description: r##"# `aarch64_unstable_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "aarch64_ver_target_feature",
        description: r##"# `aarch64_ver_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_avr_interrupt",
        description: r##"# `abi_avr_interrupt`

The tracking issue for this feature is: [#69664]

[#69664]: https://github.com/rust-lang/rust/issues/69664

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_c_cmse_nonsecure_call",
        description: r##"# `abi_c_cmse_nonsecure_call`

The tracking issue for this feature is: [#81391]

[#81391]: https://github.com/rust-lang/rust/issues/81391

------------------------

The [TrustZone-M
feature](https://developer.arm.com/documentation/100690/latest/) is available
for targets with the Armv8-M architecture profile (`thumbv8m` in their target
name).
LLVM, the Rust compiler and the linker are providing
[support](https://developer.arm.com/documentation/ecm0359818/latest/) for the
TrustZone-M feature.

One of the things provided, with this unstable feature, is the
`C-cmse-nonsecure-call` function ABI. This ABI is used on function pointers to
non-secure code to mark a non-secure function call (see [section
5.5](https://developer.arm.com/documentation/ecm0359818/latest/) for details).

With this ABI, the compiler will do the following to perform the call:
* save registers needed after the call to Secure memory
* clear all registers that might contain confidential information
* clear the Least Significant Bit of the function address
* branches using the BLXNS instruction

To avoid using the non-secure stack, the compiler will constrain the number and
type of parameters/return value.

The `extern "C-cmse-nonsecure-call"` ABI is otherwise equivalent to the
`extern "C"` ABI.

<!-- NOTE(ignore) this example is specific to thumbv8m targets -->

``` rust,ignore
#![no_std]
#![feature(abi_c_cmse_nonsecure_call)]

#[no_mangle]
pub fn call_nonsecure_function(addr: usize) -> u32 {
    let non_secure_function =
        unsafe { core::mem::transmute::<usize, extern "C-cmse-nonsecure-call" fn() -> u32>(addr) };
    non_secure_function()
}
```

``` text
$ rustc --emit asm --crate-type lib --target thumbv8m.main-none-eabi function.rs

call_nonsecure_function:
        .fnstart
        .save   {r7, lr}
        push    {r7, lr}
        .setfp  r7, sp
        mov     r7, sp
        .pad    #16
        sub     sp, #16
        str     r0, [sp, #12]
        ldr     r0, [sp, #12]
        str     r0, [sp, #8]
        b       .LBB0_1
.LBB0_1:
        ldr     r0, [sp, #8]
        push.w  {r4, r5, r6, r7, r8, r9, r10, r11}
        bic     r0, r0, #1
        mov     r1, r0
        mov     r2, r0
        mov     r3, r0
        mov     r4, r0
        mov     r5, r0
        mov     r6, r0
        mov     r7, r0
        mov     r8, r0
        mov     r9, r0
        mov     r10, r0
        mov     r11, r0
        mov     r12, r0
        msr     apsr_nzcvq, r0
        blxns   r0
        pop.w   {r4, r5, r6, r7, r8, r9, r10, r11}
        str     r0, [sp, #4]
        b       .LBB0_2
.LBB0_2:
        ldr     r0, [sp, #4]
        add     sp, #16
        pop     {r7, pc}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_msp430_interrupt",
        description: r##"# `abi_msp430_interrupt`

The tracking issue for this feature is: [#38487]

[#38487]: https://github.com/rust-lang/rust/issues/38487

------------------------

In the MSP430 architecture, interrupt handlers have a special calling
convention. You can use the `"msp430-interrupt"` ABI to make the compiler apply
the right calling convention to the interrupt handlers you define.

<!-- NOTE(ignore) this example is specific to the msp430 target -->

``` rust,ignore
#![feature(abi_msp430_interrupt)]
#![no_std]

// Place the interrupt handler at the appropriate memory address
// (Alternatively, you can use `#[used]` and remove `pub` and `#[no_mangle]`)
#[link_section = "__interrupt_vector_10"]
#[no_mangle]
pub static TIM0_VECTOR: extern "msp430-interrupt" fn() = tim0;

// The interrupt handler
extern "msp430-interrupt" fn tim0() {
    // ..
}
```

``` text
$ msp430-elf-objdump -CD ./target/msp430/release/app
Disassembly of section __interrupt_vector_10:

0000fff2 <TIM0_VECTOR>:
    fff2:       00 c0           interrupt service routine at 0xc000

Disassembly of section .text:

0000c000 <int::tim0>:
    c000:       00 13           reti
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_ptx",
        description: r##"# `abi_ptx`

The tracking issue for this feature is: [#38788]

[#38788]: https://github.com/rust-lang/rust/issues/38788

------------------------

When emitting PTX code, all vanilla Rust functions (`fn`) get translated to
"device" functions. These functions are *not* callable from the host via the
CUDA API so a crate with only device functions is not too useful!

OTOH, "global" functions *can* be called by the host; you can think of them
as the real public API of your crate. To produce a global function use the
`"ptx-kernel"` ABI.

<!-- NOTE(ignore) this example is specific to the nvptx targets -->

``` rust,ignore
#![feature(abi_ptx)]
#![no_std]

pub unsafe extern "ptx-kernel" fn global_function() {
    device_function();
}

pub fn device_function() {
    // ..
}
```

``` text
$ xargo rustc --target nvptx64-nvidia-cuda --release -- --emit=asm

$ cat $(find -name '*.s')
//
// Generated by LLVM NVPTX Back-End
//

.version 3.2
.target sm_20
.address_size 64

        // .globl       _ZN6kernel15global_function17h46111ebe6516b382E

.visible .entry _ZN6kernel15global_function17h46111ebe6516b382E()
{


        ret;
}

        // .globl       _ZN6kernel15device_function17hd6a0e4993bbf3f78E
.visible .func _ZN6kernel15device_function17hd6a0e4993bbf3f78E()
{


        ret;
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_riscv_interrupt",
        description: r##"# `abi_riscv_interrupt`

The tracking issue for this feature is: [#111889]

[#111889]: https://github.com/rust-lang/rust/issues/111889

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_unadjusted",
        description: r##"# `abi_unadjusted`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_vectorcall",
        description: r##"# `abi_vectorcall`

The tracking issue for this feature is: [#124485]

[#124485]: https://github.com/rust-lang/rust/issues/124485

------------------------

Adds support for the Windows `"vectorcall"` ABI, the equivalent of `__vectorcall` in MSVC.

```rust,ignore (only-windows-or-x86-or-x86-64)
extern "vectorcall" {
    fn add_f64s(x: f64, y: f64) -> f64;
}

fn main() {
    println!("{}", add_f64s(2.0, 4.0));
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abi_x86_interrupt",
        description: r##"# `abi_x86_interrupt`

The tracking issue for this feature is: [#40180]

[#40180]: https://github.com/rust-lang/rust/issues/40180

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "abort_unwind",
        description: r##"# `abort_unwind`

The tracking issue for this feature is: [#130338]

[#130338]: https://github.com/rust-lang/rust/issues/130338

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "acceptfilter",
        description: r##"# `acceptfilter`

The tracking issue for this feature is: [#121891]

[#121891]: https://github.com/rust-lang/rust/issues/121891

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "addr_parse_ascii",
        description: r##"# `addr_parse_ascii`

The tracking issue for this feature is: [#101035]

[#101035]: https://github.com/rust-lang/rust/issues/101035

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "adt_const_params",
        description: r##"# `adt_const_params`

The tracking issue for this feature is: [#95174]

[#95174]: https://github.com/rust-lang/rust/issues/95174

------------------------

Allows for using more complex types for const parameters, such as structs or enums.

```rust
#![feature(adt_const_params)]
#![allow(incomplete_features)]

use std::marker::ConstParamTy;

#[derive(ConstParamTy, PartialEq, Eq)]
enum Foo {
    A,
    B,
    C,
}

#[derive(ConstParamTy, PartialEq, Eq)]
struct Bar {
    flag: bool,
}

fn is_foo_a_and_bar_true<const F: Foo, const B: Bar>() -> bool {
    match (F, B.flag) {
        (Foo::A, true) => true,
        _ => false,
    }
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "alloc_error_handler",
        description: r##"# `alloc_error_handler`

The tracking issue for this feature is: [#51540]

[#51540]: https://github.com/rust-lang/rust/issues/51540

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "alloc_error_hook",
        description: r##"# `alloc_error_hook`

The tracking issue for this feature is: [#51245]

[#51245]: https://github.com/rust-lang/rust/issues/51245

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "alloc_internals",
        description: r##"# `alloc_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "alloc_layout_extra",
        description: r##"# `alloc_layout_extra`

The tracking issue for this feature is: [#55724]

[#55724]: https://github.com/rust-lang/rust/issues/55724

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "allocator_api",
        description: r##"# `allocator_api`

The tracking issue for this feature is [#32838]

[#32838]: https://github.com/rust-lang/rust/issues/32838

------------------------

Sometimes you want the memory for one collection to use a different
allocator than the memory for another collection. In this case,
replacing the global allocator is not a workable option. Instead,
you need to pass in an instance of an `AllocRef` to each collection
for which you want a custom allocator.

TBD
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "allocator_internals",
        description: r##"# `allocator_internals`

This feature does not have a tracking issue, it is an unstable implementation
detail of the `global_allocator` feature not intended for use outside the
compiler.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "allow_internal_unsafe",
        description: r##"# `allow_internal_unsafe`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "allow_internal_unstable",
        description: r##"# `allow_internal_unstable`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "anonymous_lifetime_in_impl_trait",
        description: r##"# `anonymous_lifetime_in_impl_trait`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "anonymous_pipe",
        description: r##"# `anonymous_pipe`

The tracking issue for this feature is: [#127154]

[#127154]: https://github.com/rust-lang/rust/issues/127154

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "arbitrary_self_types",
        description: r##"# `arbitrary_self_types`

The tracking issue for this feature is: [#44874]

[#44874]: https://github.com/rust-lang/rust/issues/44874

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "arbitrary_self_types_pointers",
        description: r##"# `arbitrary_self_types_pointers`

The tracking issue for this feature is: [#44874]

[#44874]: https://github.com/rust-lang/rust/issues/44874

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "arm_target_feature",
        description: r##"# `arm_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_chunks",
        description: r##"# `array_chunks`

The tracking issue for this feature is: [#74985]

[#74985]: https://github.com/rust-lang/rust/issues/74985

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_into_iter_constructors",
        description: r##"# `array_into_iter_constructors`

The tracking issue for this feature is: [#91583]

[#91583]: https://github.com/rust-lang/rust/issues/91583

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_ptr_get",
        description: r##"# `array_ptr_get`

The tracking issue for this feature is: [#119834]

[#119834]: https://github.com/rust-lang/rust/issues/119834

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_repeat",
        description: r##"# `array_repeat`

The tracking issue for this feature is: [#126695]

[#126695]: https://github.com/rust-lang/rust/issues/126695

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_try_from_fn",
        description: r##"# `array_try_from_fn`

The tracking issue for this feature is: [#89379]

[#89379]: https://github.com/rust-lang/rust/issues/89379

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_try_map",
        description: r##"# `array_try_map`

The tracking issue for this feature is: [#79711]

[#79711]: https://github.com/rust-lang/rust/issues/79711

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "array_windows",
        description: r##"# `array_windows`

The tracking issue for this feature is: [#75027]

[#75027]: https://github.com/rust-lang/rust/issues/75027

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "as_array_of_cells",
        description: r##"# `as_array_of_cells`

The tracking issue for this feature is: [#88248]

[#88248]: https://github.com/rust-lang/rust/issues/88248

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ascii_char",
        description: r##"# `ascii_char`

The tracking issue for this feature is: [#110998]

[#110998]: https://github.com/rust-lang/rust/issues/110998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ascii_char_variants",
        description: r##"# `ascii_char_variants`

The tracking issue for this feature is: [#110998]

[#110998]: https://github.com/rust-lang/rust/issues/110998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_experimental_arch",
        description: r##"# `asm_experimental_arch`

The tracking issue for this feature is: [#93335]

[#93335]: https://github.com/rust-lang/rust/issues/93335

------------------------

This feature tracks `asm!` and `global_asm!` support for the following architectures:
- NVPTX
- PowerPC
- Hexagon
- MIPS32r2 and MIPS64r2
- wasm32
- BPF
- SPIR-V
- AVR
- MSP430
- M68k
- CSKY
- SPARC

## Register classes

| Architecture | Register class | Registers                          | LLVM constraint code |
| ------------ | -------------- | ---------------------------------- | -------------------- |
| MIPS         | `reg`          | `$[2-25]`                          | `r`                  |
| MIPS         | `freg`         | `$f[0-31]`                         | `f`                  |
| NVPTX        | `reg16`        | None\*                             | `h`                  |
| NVPTX        | `reg32`        | None\*                             | `r`                  |
| NVPTX        | `reg64`        | None\*                             | `l`                  |
| Hexagon      | `reg`          | `r[0-28]`                          | `r`                  |
| Hexagon      | `preg`         | `p[0-3]`                           | Only clobbers        |
| PowerPC      | `reg`          | `r0`, `r[3-12]`, `r[14-28]`        | `r`                  |
| PowerPC      | `reg_nonzero`  | `r[3-12]`, `r[14-28]`              | `b`                  |
| PowerPC      | `freg`         | `f[0-31]`                          | `f`                  |
| PowerPC      | `vreg`         | `v[0-31]`                          | `v`                  |
| PowerPC      | `cr`           | `cr[0-7]`, `cr`                    | Only clobbers        |
| PowerPC      | `xer`          | `xer`                              | Only clobbers        |
| wasm32       | `local`        | None\*                             | `r`                  |
| BPF          | `reg`          | `r[0-10]`                          | `r`                  |
| BPF          | `wreg`         | `w[0-10]`                          | `w`                  |
| AVR          | `reg`          | `r[2-25]`, `XH`, `XL`, `ZH`, `ZL`  | `r`                  |
| AVR          | `reg_upper`    | `r[16-25]`, `XH`, `XL`, `ZH`, `ZL` | `d`                  |
| AVR          | `reg_pair`     | `r3r2` .. `r25r24`, `X`, `Z`       | `r`                  |
| AVR          | `reg_iw`       | `r25r24`, `X`, `Z`                 | `w`                  |
| AVR          | `reg_ptr`      | `X`, `Z`                           | `e`                  |
| MSP430       | `reg`          | `r[0-15]`                          | `r`                  |
| M68k         | `reg`          | `d[0-7]`, `a[0-7]`                 | `r`                  |
| M68k         | `reg_data`     | `d[0-7]`                           | `d`                  |
| M68k         | `reg_addr`     | `a[0-3]`                           | `a`                  |
| CSKY         | `reg`          | `r[0-31]`                          | `r`                  |
| CSKY         | `freg`         | `f[0-31]`                          | `f`                  |
| SPARC        | `reg`          | `r[2-29]`                          | `r`                  |
| SPARC        | `yreg`         | `y`                                | Only clobbers        |

> **Notes**:
> - NVPTX doesn't have a fixed register set, so named registers are not supported.
>
> - WebAssembly doesn't have registers, so named registers are not supported.

# Register class supported types

| Architecture | Register class                  | Target feature | Allowed types                           |
| ------------ | ------------------------------- | -------------- | --------------------------------------- |
| MIPS32       | `reg`                           | None           | `i8`, `i16`, `i32`, `f32`               |
| MIPS32       | `freg`                          | None           | `f32`, `f64`                            |
| MIPS64       | `reg`                           | None           | `i8`, `i16`, `i32`, `i64`, `f32`, `f64` |
| MIPS64       | `freg`                          | None           | `f32`, `f64`                            |
| NVPTX        | `reg16`                         | None           | `i8`, `i16`                             |
| NVPTX        | `reg32`                         | None           | `i8`, `i16`, `i32`, `f32`               |
| NVPTX        | `reg64`                         | None           | `i8`, `i16`, `i32`, `f32`, `i64`, `f64` |
| Hexagon      | `reg`                           | None           | `i8`, `i16`, `i32`, `f32`               |
| Hexagon      | `preg`                          | N/A            | Only clobbers                           |
| PowerPC      | `reg`                           | None           | `i8`, `i16`, `i32`, `i64` (powerpc64 only) |
| PowerPC      | `reg_nonzero`                   | None           | `i8`, `i16`, `i32`, `i64` (powerpc64 only) |
| PowerPC      | `freg`                          | None           | `f32`, `f64`                            |
| PowerPC      | `vreg`                          | `altivec`      | `i8x16`, `i16x8`, `i32x4`, `f32x4`      |
| PowerPC      | `vreg`                          | `vsx`          | `f32`, `f64`, `i64x2`, `f64x2`          |
| PowerPC      | `cr`                            | N/A            | Only clobbers                           |
| PowerPC      | `xer`                           | N/A            | Only clobbers                           |
| wasm32       | `local`                         | None           | `i8` `i16` `i32` `i64` `f32` `f64`      |
| BPF          | `reg`                           | None           | `i8` `i16` `i32` `i64`                  |
| BPF          | `wreg`                          | `alu32`        | `i8` `i16` `i32`                        |
| AVR          | `reg`, `reg_upper`              | None           | `i8`                                    |
| AVR          | `reg_pair`, `reg_iw`, `reg_ptr` | None           | `i16`                                   |
| MSP430       | `reg`                           | None           | `i8`, `i16`                             |
| M68k         | `reg`, `reg_addr`               | None           | `i16`, `i32`                            |
| M68k         | `reg_data`                      | None           | `i8`, `i16`, `i32`                      |
| CSKY         | `reg`                           | None           | `i8`, `i16`, `i32`                      |
| CSKY         | `freg`                          | None           | `f32`,                                  |
| SPARC        | `reg`                           | None           | `i8`, `i16`, `i32`, `i64` (SPARC64 only) |
| SPARC        | `yreg`                          | N/A            | Only clobbers                           |

## Register aliases

| Architecture | Base register | Aliases   |
| ------------ | ------------- | --------- |
| Hexagon      | `r29`         | `sp`      |
| Hexagon      | `r30`         | `fr`      |
| Hexagon      | `r31`         | `lr`      |
| PowerPC      | `r1`          | `sp`      |
| PowerPC      | `r31`         | `fp`      |
| PowerPC      | `r[0-31]`     | `[0-31]`  |
| PowerPC      | `f[0-31]`     | `fr[0-31]`|
| BPF          | `r[0-10]`     | `w[0-10]` |
| AVR          | `XH`          | `r27`     |
| AVR          | `XL`          | `r26`     |
| AVR          | `ZH`          | `r31`     |
| AVR          | `ZL`          | `r30`     |
| MSP430       | `r0`          | `pc`      |
| MSP430       | `r1`          | `sp`      |
| MSP430       | `r2`          | `sr`      |
| MSP430       | `r3`          | `cg`      |
| MSP430       | `r4`          | `fp`      |
| M68k         | `a5`          | `bp`      |
| M68k         | `a6`          | `fp`      |
| M68k         | `a7`          | `sp`, `usp`, `ssp`, `isp` |
| CSKY         | `r[0-3]`      | `a[0-3]`  |
| CSKY         | `r[4-11]`     | `l[0-7]`  |
| CSKY         | `r[12-13]`    | `t[0-1]`  |
| CSKY         | `r14`         | `sp`      |
| CSKY         | `r15`         | `lr`      |
| CSKY         | `r[16-17]`    | `l[8-9]`  |
| CSKY         | `r[18-25]`    | `t[2-9]`  |
| CSKY         | `r28`         | `rgb`     |
| CSKY         | `r29`         | `rtb`     |
| CSKY         | `r30`         | `svbr`    |
| CSKY         | `r31`         | `tls`     |
| SPARC        | `r[0-7]`      | `g[0-7]`  |
| SPARC        | `r[8-15]`     | `o[0-7]`  |
| SPARC        | `r[16-23]`    | `l[0-7]`  |
| SPARC        | `r[24-31]`    | `i[0-7]`  |

> **Notes**:
> - TI does not mandate a frame pointer for MSP430, but toolchains are allowed
    to use one; LLVM uses `r4`.

## Unsupported registers

| Architecture | Unsupported register                    | Reason                                                                                                                                                                              |
| ------------ | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| All          | `sp`, `r14`/`o6` (SPARC)                | The stack pointer must be restored to its original value at the end of an asm code block.                                                                                           |
| All          | `fr` (Hexagon), `fp` (PowerPC), `$fp` (MIPS), `Y` (AVR), `r4` (MSP430), `a6` (M68k), `r30`/`i6` (SPARC) | The frame pointer cannot be used as an input or output.                                                             |
| All          | `r19` (Hexagon), `r29` (PowerPC), `r30` (PowerPC) | These are used internally by LLVM as "base pointer" for functions with complex stack frames.                                                                              |
| MIPS         | `$0` or `$zero`                         | This is a constant zero register which can't be modified.                                                                                                                           |
| MIPS         | `$1` or `$at`                           | Reserved for assembler.                                                                                                                                                             |
| MIPS         | `$26`/`$k0`, `$27`/`$k1`                | OS-reserved registers.                                                                                                                                                              |
| MIPS         | `$28`/`$gp`                             | Global pointer cannot be used as inputs or outputs.                                                                                                                                 |
| MIPS         | `$ra`                                   | Return address cannot be used as inputs or outputs.                                                                                                                                 |
| Hexagon      | `lr`                                    | This is the link register which cannot be used as an input or output.                                                                                                               |
| PowerPC      | `r2`, `r13`                             | These are system reserved registers.                                                                                                                                                |
| PowerPC      | `lr`                                    | The link register cannot be used as an input or output.                                                                                                                             |
| PowerPC      | `ctr`                                   | The counter register cannot be used as an input or output.                                                                                                                          |
| PowerPC      | `vrsave`                                | The vrsave register cannot be used as an input or output.                                                                                                                           |
| AVR          | `r0`, `r1`, `r1r0`                      | Due to an issue in LLVM, the `r0` and `r1` registers cannot be used as inputs or outputs.  If modified, they must be restored to their original values before the end of the block. |
|MSP430        | `r0`, `r2`, `r3`                        | These are the program counter, status register, and constant generator respectively. Neither the status register nor constant generator can be written to.                          |
| M68k         | `a4`, `a5`                              | Used internally by LLVM for the base pointer and global base pointer. |
| CSKY         | `r7`, `r28`                             | Used internally by LLVM for the base pointer and global base pointer. |
| CSKY         | `r8`                                    | Used internally by LLVM for the frame pointer. |
| CSKY         | `r14`                                   | Used internally by LLVM for the stack pointer. |
| CSKY         | `r15`                                   | This is the link register. |
| CSKY         | `r[26-30]`                              | Reserved by its ABI.       |
| CSKY         | `r31`                                   | This is the TLS register.  |
| SPARC        | `r0`/`g0`                               | This is always zero and cannot be used as inputs or outputs. |
| SPARC        | `r1`/`g1`                               | Used internally by LLVM. |
| SPARC        | `r5`/`g5`                               | Reserved for system. (SPARC32 only) |
| SPARC        | `r6`/`g6`, `r7`/`g7`                    | Reserved for system. |
| SPARC        | `r31`/`i7`                              | Return address cannot be used as inputs or outputs. |


## Template modifiers

| Architecture | Register class | Modifier | Example output | LLVM modifier |
| ------------ | -------------- | -------- | -------------- | ------------- |
| MIPS         | `reg`          | None     | `$2`           | None          |
| MIPS         | `freg`         | None     | `$f0`          | None          |
| NVPTX        | `reg16`        | None     | `rs0`          | None          |
| NVPTX        | `reg32`        | None     | `r0`           | None          |
| NVPTX        | `reg64`        | None     | `rd0`          | None          |
| Hexagon      | `reg`          | None     | `r0`           | None          |
| PowerPC      | `reg`          | None     | `0`            | None          |
| PowerPC      | `reg_nonzero`  | None     | `3`            | None          |
| PowerPC      | `freg`         | None     | `0`            | None          |
| PowerPC      | `vreg`         | None     | `0`            | None          |
| SPARC        | `reg`          | None     | `%o0`          | None          |
| CSKY         | `reg`          | None     | `r0`           | None          |
| CSKY         | `freg`         | None     | `f0`           | None          |

# Flags covered by `preserves_flags`

These flags registers must be restored upon exiting the asm block if the `preserves_flags` option is set:
- AVR
  - The status register `SREG`.
- MSP430
  - The status register `r2`.
- M68k
  - The condition code register `ccr`.
- SPARC
  - Integer condition codes (`icc` and `xcc`)
  - Floating-point condition codes (`fcc[0-3]`)
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_experimental_reg",
        description: r##"# `asm_experimental_arch`

The tracking issue for this feature is: [#133416]

[#133416]: https://github.com/rust-lang/rust/issues/133416

------------------------

This tracks support for additional registers in architectures where inline assembly is already stable.

## Register classes

| Architecture | Register class | Registers | LLVM constraint code |
| ------------ | -------------- | --------- | -------------------- |
| s390x | `vreg` | `v[0-31]` | `v` |

> **Notes**:
> - s390x `vreg` is clobber-only in stable.

## Register class supported types

| Architecture | Register class | Target feature | Allowed types |
| ------------ | -------------- | -------------- | ------------- |
| s390x | `vreg` | `vector` | `i32`, `f32`, `i64`, `f64`, `i128`, `f128`, `i8x16`, `i16x8`, `i32x4`, `i64x2`, `f32x4`, `f64x2` |

## Register aliases

| Architecture | Base register | Aliases |
| ------------ | ------------- | ------- |

## Unsupported registers

| Architecture | Unsupported register | Reason |
| ------------ | -------------------- | ------ |

## Template modifiers

| Architecture | Register class | Modifier | Example output | LLVM modifier |
| ------------ | -------------- | -------- | -------------- | ------------- |
| s390x | `vreg` | None | `%v0` | None |
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_goto",
        description: r##"# `asm_goto`

The tracking issue for this feature is: [#119364]

[#119364]: https://github.com/rust-lang/rust/issues/119364

------------------------

This feature adds a `label <block>` operand type to `asm!`.

Example:
```rust,ignore (partial-example, x86-only)

unsafe {
    asm!(
        "jmp {}",
        label {
            println!("Jumped from asm!");
        }
    );
}
```

The block must have unit type or diverge. The block starts a new safety context,
so despite outer `unsafe`, you need extra unsafe to perform unsafe operations
within `label <block>`.

When `label <block>` is used together with `noreturn` option, it means that the
assembly will not fallthrough. It's allowed to jump to a label within the
assembly. In this case, the entire `asm!` expression will have an unit type as
opposed to diverging, if not all label blocks diverge. The `asm!` expression
still diverges if `noreturn` option is used and all label blocks diverge.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_goto_with_outputs",
        description: r##"# `asm_goto_with_outputs`

The tracking issue for this feature is: [#119364]

[#119364]: https://github.com/rust-lang/rust/issues/119364

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "asm_unwind",
        description: r##"# `asm_unwind`

The tracking issue for this feature is: [#93334]

[#93334]: https://github.com/rust-lang/rust/issues/93334

------------------------

This feature adds a `may_unwind` option to `asm!` which allows an `asm` block to unwind stack and be part of the stack unwinding process. This option is only supported by the LLVM backend right now.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "assert_matches",
        description: r##"# `assert_matches`

The tracking issue for this feature is: [#82775]

[#82775]: https://github.com/rust-lang/rust/issues/82775

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "associated_const_equality",
        description: r##"# `associated_const_equality`

The tracking issue for this feature is: [#92827]

[#92827]: https://github.com/rust-lang/rust/issues/92827

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "associated_type_defaults",
        description: r##"# `associated_type_defaults`

The tracking issue for this feature is: [#29661]

[#29661]: https://github.com/rust-lang/rust/issues/29661

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_closure",
        description: r##"# `async_closure`

The tracking issue for this feature is: [#62290]

[#62290]: https://github.com/rust-lang/rust/issues/62290

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_drop",
        description: r##"# `async_drop`

The tracking issue for this feature is: [#126482]

[#126482]: https://github.com/rust-lang/rust/issues/126482

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_fn_track_caller",
        description: r##"# `async_fn_track_caller`

The tracking issue for this feature is: [#110011]

[#110011]: https://github.com/rust-lang/rust/issues/110011

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_fn_traits",
        description: r##"# `async_fn_traits`

See Also: [`fn_traits`](../library-features/fn-traits.md)

----

The `async_fn_traits` feature allows for implementation of the [`AsyncFn*`] traits
for creating custom closure-like types that return futures.

[`AsyncFn*`]: ../../std/ops/trait.AsyncFn.html

The main difference to the `Fn*` family of traits is that `AsyncFn` can return a future
that borrows from itself (`FnOnce::Output` has no lifetime parameters, while `AsyncFnMut::CallRefFuture` does).
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_for_loop",
        description: r##"# `async_for_loop`

The tracking issue for this feature is: [#118898]

[#118898]: https://github.com/rust-lang/rust/issues/118898

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_gen_internals",
        description: r##"# `async_gen_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_iter_from_iter",
        description: r##"# `async_iter_from_iter`

The tracking issue for this feature is: [#81798]

[#81798]: https://github.com/rust-lang/rust/issues/81798

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_iterator",
        description: r##"# `async_iterator`

The tracking issue for this feature is: [#79024]

[#79024]: https://github.com/rust-lang/rust/issues/79024

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "async_trait_bounds",
        description: r##"# `async_trait_bounds`

The tracking issue for this feature is: [#62290]

[#62290]: https://github.com/rust-lang/rust/issues/62290

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "atomic_from_mut",
        description: r##"# `atomic_from_mut`

The tracking issue for this feature is: [#76314]

[#76314]: https://github.com/rust-lang/rust/issues/76314

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "auto_traits",
        description: r##"# `auto_traits`

The tracking issue for this feature is [#13231]

[#13231]: https://github.com/rust-lang/rust/issues/13231

----

The `auto_traits` feature gate allows you to define auto traits.

Auto traits, like [`Send`] or [`Sync`] in the standard library, are marker traits
that are automatically implemented for every type, unless the type, or a type it contains,
has explicitly opted out via a negative impl. (Negative impls are separately controlled
by the `negative_impls` feature.)

[`Send`]: ../../std/marker/trait.Send.html
[`Sync`]: ../../std/marker/trait.Sync.html

```rust,ignore (partial-example)
impl !Trait for Type {}
```

Example:

```rust
#![feature(negative_impls)]
#![feature(auto_traits)]

auto trait Valid {}

struct True;
struct False;

impl !Valid for False {}

struct MaybeValid<T>(T);

fn must_be_valid<T: Valid>(_t: T) { }

fn main() {
    // works
    must_be_valid( MaybeValid(True) );

    // compiler error - trait bound not satisfied
    // must_be_valid( MaybeValid(False) );
}
```

## Automatic trait implementations

When a type is declared as an `auto trait`, we will automatically
create impls for every struct/enum/union, unless an explicit impl is
provided. These automatic impls contain a where clause for each field
of the form `T: AutoTrait`, where `T` is the type of the field and
`AutoTrait` is the auto trait in question. As an example, consider the
struct `List` and the auto trait `Send`:

```rust
struct List<T> {
  data: T,
  next: Option<Box<List<T>>>,
}
```

Presuming that there is no explicit impl of `Send` for `List`, the
compiler will supply an automatic impl of the form:

```rust
struct List<T> {
  data: T,
  next: Option<Box<List<T>>>,
}

unsafe impl<T> Send for List<T>
where
  T: Send, // from the field `data`
  Option<Box<List<T>>>: Send, // from the field `next`
{ }
```

Explicit impls may be either positive or negative. They take the form:

```rust,ignore (partial-example)
impl<...> AutoTrait for StructName<..> { }
impl<...> !AutoTrait for StructName<..> { }
```

## Coinduction: Auto traits permit cyclic matching

Unlike ordinary trait matching, auto traits are **coinductive**. This
means, in short, that cycles which occur in trait matching are
considered ok. As an example, consider the recursive struct `List`
introduced in the previous section. In attempting to determine whether
`List: Send`, we would wind up in a cycle: to apply the impl, we must
show that `Option<Box<List>>: Send`, which will in turn require
`Box<List>: Send` and then finally `List: Send` again. Under ordinary
trait matching, this cycle would be an error, but for an auto trait it
is considered a successful match.

## Items

Auto traits cannot have any trait items, such as methods or associated types. This ensures that we can generate default implementations.

## Supertraits

Auto traits cannot have supertraits. This is for soundness reasons, as the interaction of coinduction with implied bounds is difficult to reconcile.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "autodiff",
        description: r##"# `autodiff`

The tracking issue for this feature is: [#124509]

[#124509]: https://github.com/rust-lang/rust/issues/124509

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "avx512_target_feature",
        description: r##"# `avx512_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "backtrace_frames",
        description: r##"# `backtrace_frames`

The tracking issue for this feature is: [#79676]

[#79676]: https://github.com/rust-lang/rust/issues/79676

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bigint_helper_methods",
        description: r##"# `bigint_helper_methods`

The tracking issue for this feature is: [#85532]

[#85532]: https://github.com/rust-lang/rust/issues/85532

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "binary_heap_drain_sorted",
        description: r##"# `binary_heap_drain_sorted`

The tracking issue for this feature is: [#59278]

[#59278]: https://github.com/rust-lang/rust/issues/59278

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "binary_heap_into_iter_sorted",
        description: r##"# `binary_heap_into_iter_sorted`

The tracking issue for this feature is: [#59278]

[#59278]: https://github.com/rust-lang/rust/issues/59278

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bound_as_ref",
        description: r##"# `bound_as_ref`

The tracking issue for this feature is: [#80996]

[#80996]: https://github.com/rust-lang/rust/issues/80996

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_as_ptr",
        description: r##"# `box_as_ptr`

The tracking issue for this feature is: [#129090]

[#129090]: https://github.com/rust-lang/rust/issues/129090

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_into_boxed_slice",
        description: r##"# `box_into_boxed_slice`

The tracking issue for this feature is: [#71582]

[#71582]: https://github.com/rust-lang/rust/issues/71582

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_into_inner",
        description: r##"# `box_into_inner`

The tracking issue for this feature is: [#80437]

[#80437]: https://github.com/rust-lang/rust/issues/80437

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_patterns",
        description: r##"# `box_patterns`

The tracking issue for this feature is: [#29641]

[#29641]: https://github.com/rust-lang/rust/issues/29641

------------------------

Box patterns let you match on `Box<T>`s:


```rust
#![feature(box_patterns)]

fn main() {
    let b = Some(Box::new(5));
    match b {
        Some(box n) if n < 0 => {
            println!("Box contains negative number {n}");
        },
        Some(box n) if n >= 0 => {
            println!("Box contains non-negative number {n}");
        },
        None => {
            println!("No box");
        },
        _ => unreachable!()
    }
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_uninit_write",
        description: r##"# `box_uninit_write`

The tracking issue for this feature is: [#129397]

[#129397]: https://github.com/rust-lang/rust/issues/129397

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "box_vec_non_null",
        description: r##"# `box_vec_non_null`

The tracking issue for this feature is: [#130364]

[#130364]: https://github.com/rust-lang/rust/issues/130364

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bpf_target_feature",
        description: r##"# `bpf_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "breakpoint",
        description: r##"# `breakpoint`

The tracking issue for this feature is: [#133724]

[#133724]: https://github.com/rust-lang/rust/issues/133724

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "btree_cursors",
        description: r##"# `btree_cursors`

The tracking issue for this feature is: [#107540]

[#107540]: https://github.com/rust-lang/rust/issues/107540

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "btree_entry_insert",
        description: r##"# `btree_entry_insert`

The tracking issue for this feature is: [#65225]

[#65225]: https://github.com/rust-lang/rust/issues/65225

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "btree_extract_if",
        description: r##"# `btree_extract_if`

The tracking issue for this feature is: [#70530]

[#70530]: https://github.com/rust-lang/rust/issues/70530

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "btree_set_entry",
        description: r##"# `btree_set_entry`

The tracking issue for this feature is: [#133549]

[#133549]: https://github.com/rust-lang/rust/issues/133549

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "btreemap_alloc",
        description: r##"# `btreemap_alloc`

The tracking issue for this feature is: [#32838]

[#32838]: https://github.com/rust-lang/rust/issues/32838

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "buf_read_has_data_left",
        description: r##"# `buf_read_has_data_left`

The tracking issue for this feature is: [#86423]

[#86423]: https://github.com/rust-lang/rust/issues/86423

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "bufreader_peek",
        description: r##"# `bufreader_peek`

The tracking issue for this feature is: [#128405]

[#128405]: https://github.com/rust-lang/rust/issues/128405

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "builtin_syntax",
        description: r##"# `builtin_syntax`

The tracking issue for this feature is: [#110680]

[#110680]: https://github.com/rust-lang/rust/issues/110680

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "c_size_t",
        description: r##"# `c_size_t`

The tracking issue for this feature is: [#88345]

[#88345]: https://github.com/rust-lang/rust/issues/88345

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "c_str_module",
        description: r##"# `c_str_module`

The tracking issue for this feature is: [#112134]

[#112134]: https://github.com/rust-lang/rust/issues/112134

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "c_variadic",
        description: r##"# `c_variadic`

The tracking issue for this feature is: [#44930]

[#44930]: https://github.com/rust-lang/rust/issues/44930

------------------------

The `c_variadic` language feature enables C-variadic functions to be
defined in Rust. They may be called both from within Rust and via FFI.

## Examples

```rust
#![feature(c_variadic)]

pub unsafe extern "C" fn add(n: usize, mut args: ...) -> usize {
    let mut sum = 0;
    for _ in 0..n {
        sum += args.arg::<usize>();
    }
    sum
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "c_variadic",
        description: r##"# `c_variadic`

The tracking issue for this feature is: [#44930]

[#44930]: https://github.com/rust-lang/rust/issues/44930

------------------------

The `c_variadic` library feature exposes the `VaList` structure,
Rust's analogue of C's `va_list` type.

## Examples

```rust
#![feature(c_variadic)]

use std::ffi::VaList;

pub unsafe extern "C" fn vadd(n: usize, mut args: VaList) -> usize {
    let mut sum = 0;
    for _ in 0..n {
        sum += args.arg::<usize>();
    }
    sum
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "c_void_variant",
        description: r##"# `c_void_variant`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "can_vector",
        description: r##"# `can_vector`

The tracking issue for this feature is: [#69941]

[#69941]: https://github.com/rust-lang/rust/issues/69941

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cell_leak",
        description: r##"# `cell_leak`

The tracking issue for this feature is: [#69099]

[#69099]: https://github.com/rust-lang/rust/issues/69099

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cell_update",
        description: r##"# `cell_update`

The tracking issue for this feature is: [#50186]

[#50186]: https://github.com/rust-lang/rust/issues/50186

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_accessible",
        description: r##"# `cfg_accessible`

The tracking issue for this feature is: [#64797]

[#64797]: https://github.com/rust-lang/rust/issues/64797

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_eval",
        description: r##"# `cfg_eval`

The tracking issue for this feature is: [#82679]

[#82679]: https://github.com/rust-lang/rust/issues/82679

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_match",
        description: r##"# `cfg_match`

The tracking issue for this feature is: [#115585]

[#115585]: https://github.com/rust-lang/rust/issues/115585

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_overflow_checks",
        description: r##"# `cfg_overflow_checks`

The tracking issue for this feature is: [#111466]

[#111466]: https://github.com/rust-lang/rust/issues/111466

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_relocation_model",
        description: r##"# `cfg_relocation_model`

The tracking issue for this feature is: [#114929]

[#114929]: https://github.com/rust-lang/rust/issues/114929

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_sanitize",
        description: r##"# `cfg_sanitize`

The tracking issue for this feature is: [#39699]

[#39699]: https://github.com/rust-lang/rust/issues/39699

------------------------

The `cfg_sanitize` feature makes it possible to execute different code
depending on whether a particular sanitizer is enabled or not.

## Examples

```rust
#![feature(cfg_sanitize)]

#[cfg(sanitize = "thread")]
fn a() {
    // ...
}

#[cfg(not(sanitize = "thread"))]
fn a() {
    // ...
}

fn b() {
    if cfg!(sanitize = "leak") {
        // ...
    } else {
        // ...
    }
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_sanitizer_cfi",
        description: r##"# `cfg_sanitizer_cfi`

The tracking issue for this feature is: [#89653]

[#89653]: https://github.com/rust-lang/rust/issues/89653

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_target_compact",
        description: r##"# `cfg_target_compact`

The tracking issue for this feature is: [#96901]

[#96901]: https://github.com/rust-lang/rust/issues/96901

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_target_has_atomic",
        description: r##"# `cfg_target_has_atomic`

The tracking issue for this feature is: [#94039]

[#94039]: https://github.com/rust-lang/rust/issues/94039

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_target_has_atomic_equal_alignment",
        description: r##"# `cfg_target_has_atomic_equal_alignment`

The tracking issue for this feature is: [#93822]

[#93822]: https://github.com/rust-lang/rust/issues/93822

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_target_thread_local",
        description: r##"# `cfg_target_thread_local`

The tracking issue for this feature is: [#29594]

[#29594]: https://github.com/rust-lang/rust/issues/29594

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_ub_checks",
        description: r##"# `cfg_ub_checks`

The tracking issue for this feature is: [#123499]

[#123499]: https://github.com/rust-lang/rust/issues/123499

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfg_version",
        description: r##"# `cfg_version`

The tracking issue for this feature is: [#64796]

[#64796]: https://github.com/rust-lang/rust/issues/64796

------------------------

The `cfg_version` feature makes it possible to execute different code
depending on the compiler version. It will return true if the compiler
version is greater than or equal to the specified version.

## Examples

```rust
#![feature(cfg_version)]

#[cfg(version("1.42"))] // 1.42 and above
fn a() {
    // ...
}

#[cfg(not(version("1.42")))] // 1.41 and below
fn a() {
    // ...
}

fn b() {
    if cfg!(version("1.42")) {
        // ...
    } else {
        // ...
    }
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cfi_encoding",
        description: r##"# `cfi_encoding`

The tracking issue for this feature is: [#89653]

[#89653]: https://github.com/rust-lang/rust/issues/89653

------------------------

The `cfi_encoding` feature allows the user to define a CFI encoding for a type.
It allows the user to use a different names for types that otherwise would be
required to have the same name as used in externally defined C functions.

## Examples

```rust
#![feature(cfi_encoding, extern_types)]

#[cfi_encoding = "3Foo"]
pub struct Type1(i32);

extern {
    #[cfi_encoding = "3Bar"]
    type Type2;
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "char_internals",
        description: r##"# `char_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clone_to_uninit",
        description: r##"# `clone_to_uninit`

The tracking issue for this feature is: [#126799]

[#126799]: https://github.com/rust-lang/rust/issues/126799

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "closure_lifetime_binder",
        description: r##"# `closure_lifetime_binder`

The tracking issue for this feature is: [#97362]

[#97362]: https://github.com/rust-lang/rust/issues/97362

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "closure_track_caller",
        description: r##"# `closure_track_caller`

The tracking issue for this feature is: [#87417]

[#87417]: https://github.com/rust-lang/rust/issues/87417

------------------------

Allows using the `#[track_caller]` attribute on closures and coroutines.
Calls made to the closure or coroutine will have caller information
available through `std::panic::Location::caller()`, just like using
`#[track_caller]` on a function.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cmp_minmax",
        description: r##"# `cmp_minmax`

The tracking issue for this feature is: [#115939]

[#115939]: https://github.com/rust-lang/rust/issues/115939

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cmse_nonsecure_entry",
        description: r##"# `cmse_nonsecure_entry`

The tracking issue for this feature is: [#75835]

[#75835]: https://github.com/rust-lang/rust/issues/75835

------------------------

The [TrustZone-M
feature](https://developer.arm.com/documentation/100690/latest/) is available
for targets with the Armv8-M architecture profile (`thumbv8m` in their target
name).
LLVM, the Rust compiler and the linker are providing
[support](https://developer.arm.com/documentation/ecm0359818/latest/) for the
TrustZone-M feature.

One of the things provided, with this unstable feature, is the
`C-cmse-nonsecure-entry` ABI. This ABI marks a Secure function as an
entry function (see [section
5.4](https://developer.arm.com/documentation/ecm0359818/latest/) for details).
With this ABI, the compiler will do the following:
* add a special symbol on the function which is the `__acle_se_` prefix and the
  standard function name
* constrain the number of parameters to avoid using the Non-Secure stack
* before returning from the function, clear registers that might contain Secure
  information
* use the `BXNS` instruction to return

Because the stack can not be used to pass parameters, there will be compilation
errors if:
* the total size of all parameters is too big (for example more than four 32
  bits integers)
* the entry function is not using a C ABI

The special symbol `__acle_se_` will be used by the linker to generate a secure
gateway veneer.

<!-- NOTE(ignore) this example is specific to thumbv8m targets -->

``` rust,ignore
#![no_std]
#![feature(cmse_nonsecure_entry)]

#[no_mangle]
pub extern "C-cmse-nonsecure-entry" fn entry_function(input: u32) -> u32 {
    input + 6
}
```

``` text
$ rustc --emit obj --crate-type lib --target thumbv8m.main-none-eabi function.rs
$ arm-none-eabi-objdump -D function.o

00000000 <entry_function>:
   0:   b580            push    {r7, lr}
   2:   466f            mov     r7, sp
   4:   b082            sub     sp, #8
   6:   9001            str     r0, [sp, #4]
   8:   1d81            adds    r1, r0, #6
   a:   460a            mov     r2, r1
   c:   4281            cmp     r1, r0
   e:   9200            str     r2, [sp, #0]
  10:   d30b            bcc.n   2a <entry_function+0x2a>
  12:   e7ff            b.n     14 <entry_function+0x14>
  14:   9800            ldr     r0, [sp, #0]
  16:   b002            add     sp, #8
  18:   e8bd 4080       ldmia.w sp!, {r7, lr}
  1c:   4671            mov     r1, lr
  1e:   4672            mov     r2, lr
  20:   4673            mov     r3, lr
  22:   46f4            mov     ip, lr
  24:   f38e 8800       msr     CPSR_f, lr
  28:   4774            bxns    lr
  2a:   f240 0000       movw    r0, #0
  2e:   f2c0 0000       movt    r0, #0
  32:   f240 0200       movw    r2, #0
  36:   f2c0 0200       movt    r2, #0
  3a:   211c            movs    r1, #28
  3c:   f7ff fffe       bl      0 <_ZN4core9panicking5panic17h5c028258ca2fb3f5E>
  40:   defe            udf     #254    ; 0xfe
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coerce_unsized",
        description: r##"# `coerce_unsized`

The tracking issue for this feature is: [#18598]

[#18598]: https://github.com/rust-lang/rust/issues/18598

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "compiler_builtins",
        description: r##"# `compiler_builtins`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "concat_bytes",
        description: r##"# `concat_bytes`

The tracking issue for this feature is: [#87555]

[#87555]: https://github.com/rust-lang/rust/issues/87555

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "concat_idents",
        description: r##"# `concat_idents`

The tracking issue for this feature is: [#29599]

[#29599]: https://github.com/rust-lang/rust/issues/29599

------------------------

The `concat_idents` feature adds a macro for concatenating multiple identifiers
into one identifier.

## Examples

```rust
#![feature(concat_idents)]

fn main() {
    fn foobar() -> u32 { 23 }
    let f = concat_idents!(foo, bar);
    assert_eq!(f(), 23);
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_alloc_error",
        description: r##"# `const_alloc_error`

The tracking issue for this feature is: [#92523]

[#92523]: https://github.com/rust-lang/rust/issues/92523

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_alloc_layout",
        description: r##"# `const_alloc_layout`

The tracking issue for this feature is: [#67521]

[#67521]: https://github.com/rust-lang/rust/issues/67521

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_array_as_mut_slice",
        description: r##"# `const_array_as_mut_slice`

The tracking issue for this feature is: [#133333]

[#133333]: https://github.com/rust-lang/rust/issues/133333

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_array_each_ref",
        description: r##"# `const_array_each_ref`

The tracking issue for this feature is: [#133289]

[#133289]: https://github.com/rust-lang/rust/issues/133289

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_async_blocks",
        description: r##"# `const_async_blocks`

The tracking issue for this feature is: [#85368]

[#85368]: https://github.com/rust-lang/rust/issues/85368

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_black_box",
        description: r##"# `const_black_box`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_box",
        description: r##"# `const_box`

The tracking issue for this feature is: [#92521]

[#92521]: https://github.com/rust-lang/rust/issues/92521

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_btree_len",
        description: r##"# `const_btree_len`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_cell",
        description: r##"# `const_cell`

The tracking issue for this feature is: [#131283]

[#131283]: https://github.com/rust-lang/rust/issues/131283

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_char_classify",
        description: r##"# `const_char_classify`

The tracking issue for this feature is: [#132241]

[#132241]: https://github.com/rust-lang/rust/issues/132241

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_closures",
        description: r##"# `const_closures`

The tracking issue for this feature is: [#106003]

[#106003]: https://github.com/rust-lang/rust/issues/106003

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_copy_from_slice",
        description: r##"# `const_copy_from_slice`

The tracking issue for this feature is: [#131415]

[#131415]: https://github.com/rust-lang/rust/issues/131415

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_destruct",
        description: r##"# `const_destruct`

The tracking issue for this feature is: [#133214]

[#133214]: https://github.com/rust-lang/rust/issues/133214

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_eval_select",
        description: r##"# `const_eval_select`

The tracking issue for this feature is: [#124625]

[#124625]: https://github.com/rust-lang/rust/issues/124625

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_for",
        description: r##"# `const_for`

The tracking issue for this feature is: [#87575]

[#87575]: https://github.com/rust-lang/rust/issues/87575

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_format_args",
        description: r##"# `const_format_args`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_heap",
        description: r##"# `const_heap`

The tracking issue for this feature is: [#79597]

[#79597]: https://github.com/rust-lang/rust/issues/79597

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_is_char_boundary",
        description: r##"# `const_is_char_boundary`

The tracking issue for this feature is: [#131516]

[#131516]: https://github.com/rust-lang/rust/issues/131516

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_mut_cursor",
        description: r##"# `const_mut_cursor`

The tracking issue for this feature is: [#130801]

[#130801]: https://github.com/rust-lang/rust/issues/130801

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_precise_live_drops",
        description: r##"# `const_precise_live_drops`

The tracking issue for this feature is: [#73255]

[#73255]: https://github.com/rust-lang/rust/issues/73255

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_ptr_sub_ptr",
        description: r##"# `const_ptr_sub_ptr`

The tracking issue for this feature is: [#95892]

[#95892]: https://github.com/rust-lang/rust/issues/95892

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_range_bounds",
        description: r##"# `const_range_bounds`

The tracking issue for this feature is: [#108082]

[#108082]: https://github.com/rust-lang/rust/issues/108082

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_raw_ptr_comparison",
        description: r##"# `const_raw_ptr_comparison`

The tracking issue for this feature is: [#53020]

[#53020]: https://github.com/rust-lang/rust/issues/53020

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_slice_flatten",
        description: r##"# `const_slice_flatten`

The tracking issue for this feature is: [#95629]

[#95629]: https://github.com/rust-lang/rust/issues/95629

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_slice_from_mut_ptr_range",
        description: r##"# `const_slice_from_mut_ptr_range`

The tracking issue for this feature is: [#89792]

[#89792]: https://github.com/rust-lang/rust/issues/89792

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_slice_from_ptr_range",
        description: r##"# `const_slice_from_ptr_range`

The tracking issue for this feature is: [#89792]

[#89792]: https://github.com/rust-lang/rust/issues/89792

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_sockaddr_setters",
        description: r##"# `const_sockaddr_setters`

The tracking issue for this feature is: [#131714]

[#131714]: https://github.com/rust-lang/rust/issues/131714

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_str_from_utf8",
        description: r##"# `const_str_from_utf8`

The tracking issue for this feature is: [#91006]

[#91006]: https://github.com/rust-lang/rust/issues/91006

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_str_split_at",
        description: r##"# `const_str_split_at`

The tracking issue for this feature is: [#131518]

[#131518]: https://github.com/rust-lang/rust/issues/131518

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_swap",
        description: r##"# `const_swap`

The tracking issue for this feature is: [#83163]

[#83163]: https://github.com/rust-lang/rust/issues/83163

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_swap_nonoverlapping",
        description: r##"# `const_swap_nonoverlapping`

The tracking issue for this feature is: [#133668]

[#133668]: https://github.com/rust-lang/rust/issues/133668

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_trait_impl",
        description: r##"# `const_trait_impl`

The tracking issue for this feature is: [#143874]

[#143874]: https://github.com/rust-lang/rust/issues/143874

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_try",
        description: r##"# `const_try`

The tracking issue for this feature is: [#74935]

[#74935]: https://github.com/rust-lang/rust/issues/74935

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_type_id",
        description: r##"# `const_type_id`

The tracking issue for this feature is: [#77125]

[#77125]: https://github.com/rust-lang/rust/issues/77125

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_type_name",
        description: r##"# `const_type_name`

The tracking issue for this feature is: [#63084]

[#63084]: https://github.com/rust-lang/rust/issues/63084

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_typed_swap",
        description: r##"# `const_typed_swap`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "const_vec_string_slice",
        description: r##"# `const_vec_string_slice`

The tracking issue for this feature is: [#129041]

[#129041]: https://github.com/rust-lang/rust/issues/129041

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "container_error_extra",
        description: r##"# `container_error_extra`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "context_ext",
        description: r##"# `context_ext`

The tracking issue for this feature is: [#123392]

[#123392]: https://github.com/rust-lang/rust/issues/123392

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "convert_float_to_int",
        description: r##"# `convert_float_to_int`

The tracking issue for this feature is: [#67057]

[#67057]: https://github.com/rust-lang/rust/issues/67057

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "core_intrinsics",
        description: r##"# `core_intrinsics`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "core_io_borrowed_buf",
        description: r##"# `core_io_borrowed_buf`

The tracking issue for this feature is: [#117693]

[#117693]: https://github.com/rust-lang/rust/issues/117693

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "core_private_bignum",
        description: r##"# `core_private_bignum`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "core_private_diy_float",
        description: r##"# `core_private_diy_float`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coroutine_clone",
        description: r##"# `coroutine_clone`

The tracking issue for this feature is: [#95360]

[#95360]: https://github.com/rust-lang/rust/issues/95360

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coroutine_trait",
        description: r##"# `coroutine_trait`

The tracking issue for this feature is: [#43122]

[#43122]: https://github.com/rust-lang/rust/issues/43122

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coroutines",
        description: r##"# `coroutines`

The tracking issue for this feature is: [#43122]

[#43122]: https://github.com/rust-lang/rust/issues/43122

------------------------

The `coroutines` feature gate in Rust allows you to define coroutine or
coroutine literals. A coroutine is a "resumable function" that syntactically
resembles a closure but compiles to much different semantics in the compiler
itself. The primary feature of a coroutine is that it can be suspended during
execution to be resumed at a later date. Coroutines use the `yield` keyword to
"return", and then the caller can `resume` a coroutine to resume execution just
after the `yield` keyword.

Coroutines are an extra-unstable feature in the compiler right now. Added in
[RFC 2033] they're mostly intended right now as a information/constraint
gathering phase. The intent is that experimentation can happen on the nightly
compiler before actual stabilization. A further RFC will be required to
stabilize coroutines and will likely contain at least a few small
tweaks to the overall design.

[RFC 2033]: https://github.com/rust-lang/rfcs/pull/2033

A syntactical example of a coroutine is:

```rust
#![feature(coroutines, coroutine_trait, stmt_expr_attributes)]

use std::ops::{Coroutine, CoroutineState};
use std::pin::Pin;

fn main() {
    let mut coroutine = #[coroutine] || {
        yield 1;
        return "foo"
    };

    match Pin::new(&mut coroutine).resume(()) {
        CoroutineState::Yielded(1) => {}
        _ => panic!("unexpected value from resume"),
    }
    match Pin::new(&mut coroutine).resume(()) {
        CoroutineState::Complete("foo") => {}
        _ => panic!("unexpected value from resume"),
    }
}
```

Coroutines are closure-like literals which are annotated with `#[coroutine]`
and can contain a `yield` statement. The
`yield` statement takes an optional expression of a value to yield out of the
coroutine. All coroutine literals implement the `Coroutine` trait in the
`std::ops` module. The `Coroutine` trait has one main method, `resume`, which
resumes execution of the coroutine at the previous suspension point.

An example of the control flow of coroutines is that the following example
prints all numbers in order:

```rust
#![feature(coroutines, coroutine_trait, stmt_expr_attributes)]

use std::ops::Coroutine;
use std::pin::Pin;

fn main() {
    let mut coroutine = #[coroutine] || {
        println!("2");
        yield;
        println!("4");
    };

    println!("1");
    Pin::new(&mut coroutine).resume(());
    println!("3");
    Pin::new(&mut coroutine).resume(());
    println!("5");
}
```

At this time the main use case of coroutines is an implementation
primitive for `async`/`await` and `gen` syntax, but coroutines
will likely be extended to other primitives in the future.
Feedback on the design and usage is always appreciated!

### The `Coroutine` trait

The `Coroutine` trait in `std::ops` currently looks like:

```rust
# #![feature(arbitrary_self_types, coroutine_trait)]
# use std::ops::CoroutineState;
# use std::pin::Pin;

pub trait Coroutine<R = ()> {
    type Yield;
    type Return;
    fn resume(self: Pin<&mut Self>, resume: R) -> CoroutineState<Self::Yield, Self::Return>;
}
```

The `Coroutine::Yield` type is the type of values that can be yielded with the
`yield` statement. The `Coroutine::Return` type is the returned type of the
coroutine. This is typically the last expression in a coroutine's definition or
any value passed to `return` in a coroutine. The `resume` function is the entry
point for executing the `Coroutine` itself.

The return value of `resume`, `CoroutineState`, looks like:

```rust
pub enum CoroutineState<Y, R> {
    Yielded(Y),
    Complete(R),
}
```

The `Yielded` variant indicates that the coroutine can later be resumed. This
corresponds to a `yield` point in a coroutine. The `Complete` variant indicates
that the coroutine is complete and cannot be resumed again. Calling `resume`
after a coroutine has returned `Complete` will likely result in a panic of the
program.

### Closure-like semantics

The closure-like syntax for coroutines alludes to the fact that they also have
closure-like semantics. Namely:

* When created, a coroutine executes no code. A closure literal does not
  actually execute any of the closure's code on construction, and similarly a
  coroutine literal does not execute any code inside the coroutine when
  constructed.

* Coroutines can capture outer variables by reference or by move, and this can
  be tweaked with the `move` keyword at the beginning of the closure. Like
  closures all coroutines will have an implicit environment which is inferred by
  the compiler. Outer variables can be moved into a coroutine for use as the
  coroutine progresses.

* Coroutine literals produce a value with a unique type which implements the
  `std::ops::Coroutine` trait. This allows actual execution of the coroutine
  through the `Coroutine::resume` method as well as also naming it in return
  types and such.

* Traits like `Send` and `Sync` are automatically implemented for a `Coroutine`
  depending on the captured variables of the environment. Unlike closures,
  coroutines also depend on variables live across suspension points. This means
  that although the ambient environment may be `Send` or `Sync`, the coroutine
  itself may not be due to internal variables live across `yield` points being
  not-`Send` or not-`Sync`. Note that coroutines do
  not implement traits like `Copy` or `Clone` automatically.

* Whenever a coroutine is dropped it will drop all captured environment
  variables.

### Coroutines as state machines

In the compiler, coroutines are currently compiled as state machines. Each
`yield` expression will correspond to a different state that stores all live
variables over that suspension point. Resumption of a coroutine will dispatch on
the current state and then execute internally until a `yield` is reached, at
which point all state is saved off in the coroutine and a value is returned.

Let's take a look at an example to see what's going on here:

```rust
#![feature(coroutines, coroutine_trait, stmt_expr_attributes)]

use std::ops::Coroutine;
use std::pin::Pin;

fn main() {
    let ret = "foo";
    let mut coroutine = #[coroutine] move || {
        yield 1;
        return ret
    };

    Pin::new(&mut coroutine).resume(());
    Pin::new(&mut coroutine).resume(());
}
```

This coroutine literal will compile down to something similar to:

```rust
#![feature(arbitrary_self_types, coroutine_trait)]

use std::ops::{Coroutine, CoroutineState};
use std::pin::Pin;

fn main() {
    let ret = "foo";
    let mut coroutine = {
        enum __Coroutine {
            Start(&'static str),
            Yield1(&'static str),
            Done,
        }

        impl Coroutine for __Coroutine {
            type Yield = i32;
            type Return = &'static str;

            fn resume(mut self: Pin<&mut Self>, resume: ()) -> CoroutineState<i32, &'static str> {
                use std::mem;
                match mem::replace(&mut *self, __Coroutine::Done) {
                    __Coroutine::Start(s) => {
                        *self = __Coroutine::Yield1(s);
                        CoroutineState::Yielded(1)
                    }

                    __Coroutine::Yield1(s) => {
                        *self = __Coroutine::Done;
                        CoroutineState::Complete(s)
                    }

                    __Coroutine::Done => {
                        panic!("coroutine resumed after completion")
                    }
                }
            }
        }

        __Coroutine::Start(ret)
    };

    Pin::new(&mut coroutine).resume(());
    Pin::new(&mut coroutine).resume(());
}
```

Notably here we can see that the compiler is generating a fresh type,
`__Coroutine` in this case. This type has a number of states (represented here
as an `enum`) corresponding to each of the conceptual states of the coroutine.
At the beginning we're closing over our outer variable `foo` and then that
variable is also live over the `yield` point, so it's stored in both states.

When the coroutine starts it'll immediately yield 1, but it saves off its state
just before it does so indicating that it has reached the yield point. Upon
resuming again we'll execute the `return ret` which returns the `Complete`
state.

Here we can also note that the `Done` state, if resumed, panics immediately as
it's invalid to resume a completed coroutine. It's also worth noting that this
is just a rough desugaring, not a normative specification for what the compiler
does.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "coverage_attribute",
        description: r##"# `coverage_attribute`

The tracking issue for this feature is: [#84605]

[#84605]: https://github.com/rust-lang/rust/issues/84605

---

The `coverage` attribute can be used to selectively disable coverage
instrumentation in an annotated function. This might be useful to:

-   Avoid instrumentation overhead in a performance critical function
-   Avoid generating coverage for a function that is not meant to be executed,
    but still target 100% coverage for the rest of the program.

## Example

```rust
#![feature(coverage_attribute)]

// `foo()` will get coverage instrumentation (by default)
fn foo() {
  // ...
}

#[coverage(off)]
fn bar() {
  // ...
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cow_is_borrowed",
        description: r##"# `cow_is_borrowed`

The tracking issue for this feature is: [#65143]

[#65143]: https://github.com/rust-lang/rust/issues/65143

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "csky_target_feature",
        description: r##"# `csky_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cstr_bytes",
        description: r##"# `cstr_bytes`

The tracking issue for this feature is: [#112115]

[#112115]: https://github.com/rust-lang/rust/issues/112115

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cstr_internals",
        description: r##"# `cstr_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "cursor_split",
        description: r##"# `cursor_split`

The tracking issue for this feature is: [#86369]

[#86369]: https://github.com/rust-lang/rust/issues/86369

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "custom_inner_attributes",
        description: r##"# `custom_inner_attributes`

The tracking issue for this feature is: [#54726]

[#54726]: https://github.com/rust-lang/rust/issues/54726

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "custom_mir",
        description: r##"# `custom_mir`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "custom_test_frameworks",
        description: r##"# `custom_test_frameworks`

The tracking issue for this feature is: [#50297]

[#50297]: https://github.com/rust-lang/rust/issues/50297

------------------------

The `custom_test_frameworks` feature allows the use of `#[test_case]` and `#![test_runner]`.
Any function, const, or static can be annotated with `#[test_case]` causing it to be aggregated (like `#[test]`)
and be passed to the test runner determined by the `#![test_runner]` crate attribute.

```rust
#![feature(custom_test_frameworks)]
#![test_runner(my_runner)]

fn my_runner(tests: &[&i32]) {
    for t in tests {
        if **t == 0 {
            println!("PASSED");
        } else {
            println!("FAILED");
        }
    }
}

#[test_case]
const WILL_PASS: i32 = 0;

#[test_case]
const WILL_FAIL: i32 = 4;
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deadline_api",
        description: r##"# `deadline_api`

The tracking issue for this feature is: [#46316]

[#46316]: https://github.com/rust-lang/rust/issues/46316

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "debug_closure_helpers",
        description: r##"# `debug_closure_helpers`

The tracking issue for this feature is: [#117729]

[#117729]: https://github.com/rust-lang/rust/issues/117729

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dec2flt",
        description: r##"# `dec2flt`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "decl_macro",
        description: r##"# `decl_macro`

The tracking issue for this feature is: [#39412]

[#39412]: https://github.com/rust-lang/rust/issues/39412

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "default_field_values",
        description: r##"# `default_field_values`

The tracking issue for this feature is: [#132162]

[#132162]: https://github.com/rust-lang/rust/issues/132162

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_safe",
        description: r##"# `deprecated_safe`

The tracking issue for this feature is: [#94978]

[#94978]: https://github.com/rust-lang/rust/issues/94978

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deprecated_suggestion",
        description: r##"# `deprecated_suggestion`

The tracking issue for this feature is: [#94785]

[#94785]: https://github.com/rust-lang/rust/issues/94785

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deref_patterns",
        description: r##"# `deref_patterns`

The tracking issue for this feature is: [#87121]

[#87121]: https://github.com/rust-lang/rust/issues/87121

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "deref_pure_trait",
        description: r##"# `deref_pure_trait`

The tracking issue for this feature is: [#87121]

[#87121]: https://github.com/rust-lang/rust/issues/87121

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "derive_clone_copy",
        description: r##"# `derive_clone_copy`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "derive_coerce_pointee",
        description: r##"# `derive_coerce_pointee`

The tracking issue for this feature is: [#123430]

[#123430]: https://github.com/rust-lang/rust/issues/123430

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "derive_const",
        description: r##"# `derive_const`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "derive_eq",
        description: r##"# `derive_eq`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dir_entry_ext2",
        description: r##"# `dir_entry_ext2`

The tracking issue for this feature is: [#85573]

[#85573]: https://github.com/rust-lang/rust/issues/85573

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "discriminant_kind",
        description: r##"# `discriminant_kind`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dispatch_from_dyn",
        description: r##"# `dispatch_from_dyn`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "do_not_recommend",
        description: r##"# `do_not_recommend`

The tracking issue for this feature is: [#51992]

[#51992]: https://github.com/rust-lang/rust/issues/51992

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "doc_auto_cfg",
        description: r##"# `doc_auto_cfg`

The tracking issue for this feature is: [#43781]

[#43781]: https://github.com/rust-lang/rust/issues/43781

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "doc_cfg",
        description: r##"# `doc_cfg`

The tracking issue for this feature is: [#43781]

------

The `doc_cfg` feature allows an API be documented as only available in some specific platforms.
This attribute has two effects:

1. In the annotated item's documentation, there will be a message saying "Available on
    (platform) only".

2. The item's doc-tests will only run on the specific platform.

In addition to allowing the use of the `#[doc(cfg)]` attribute, this feature enables the use of a
special conditional compilation flag, `#[cfg(doc)]`, set whenever building documentation on your
crate.

This feature was introduced as part of PR [#43348] to allow the platform-specific parts of the
standard library be documented.

```rust
#![feature(doc_cfg)]

#[cfg(any(windows, doc))]
#[doc(cfg(windows))]
/// The application's icon in the notification area (a.k.a. system tray).
///
/// # Examples
///
/// ```no_run
/// extern crate my_awesome_ui_library;
/// use my_awesome_ui_library::current_app;
/// use my_awesome_ui_library::windows::notification;
///
/// let icon = current_app().get::<notification::Icon>();
/// icon.show();
/// icon.show_message("Hello");
/// ```
pub struct Icon {
    // ...
}
```

[#43781]: https://github.com/rust-lang/rust/issues/43781
[#43348]: https://github.com/rust-lang/rust/issues/43348
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "doc_cfg_hide",
        description: r##"# `doc_cfg_hide`

The tracking issue for this feature is: [#43781]

[#43781]: https://github.com/rust-lang/rust/issues/43781

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "doc_masked",
        description: r##"# `doc_masked`

The tracking issue for this feature is: [#44027]

-----

The `doc_masked` feature allows a crate to exclude types from a given crate from appearing in lists
of trait implementations. The specifics of the feature are as follows:

1. When rustdoc encounters an `extern crate` statement annotated with a `#[doc(masked)]` attribute,
   it marks the crate as being masked.

2. When listing traits a given type implements, rustdoc ensures that traits from masked crates are
   not emitted into the documentation.

3. When listing types that implement a given trait, rustdoc ensures that types from masked crates
   are not emitted into the documentation.

This feature was introduced in PR [#44026] to ensure that compiler-internal and
implementation-specific types and traits were not included in the standard library's documentation.
Such types would introduce broken links into the documentation.

[#44026]: https://github.com/rust-lang/rust/pull/44026
[#44027]: https://github.com/rust-lang/rust/pull/44027
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "doc_notable_trait",
        description: r##"# `doc_notable_trait`

The tracking issue for this feature is: [#45040]

The `doc_notable_trait` feature allows the use of the `#[doc(notable_trait)]`
attribute, which will display the trait in a "Notable traits" dialog for
functions returning types that implement the trait. For example, this attribute
is applied to the `Iterator`, `Future`, `io::Read`, and `io::Write` traits in
the standard library.

You can do this on your own traits like so:

```
#![feature(doc_notable_trait)]

#[doc(notable_trait)]
pub trait MyTrait {}

pub struct MyStruct;
impl MyTrait for MyStruct {}

/// The docs for this function will have a button that displays a dialog about
/// `MyStruct` implementing `MyTrait`.
pub fn my_fn() -> MyStruct { MyStruct }
```

This feature was originally implemented in PR [#45039].

See also its documentation in [the rustdoc book][rustdoc-book-notable_trait].

[#45040]: https://github.com/rust-lang/rust/issues/45040
[#45039]: https://github.com/rust-lang/rust/pull/45039
[rustdoc-book-notable_trait]: ../../rustdoc/unstable-features.html#adding-your-trait-to-the-notable-traits-dialog
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "downcast_unchecked",
        description: r##"# `downcast_unchecked`

The tracking issue for this feature is: [#90850]

[#90850]: https://github.com/rust-lang/rust/issues/90850

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "drain_keep_rest",
        description: r##"# `drain_keep_rest`

The tracking issue for this feature is: [#101122]

[#101122]: https://github.com/rust-lang/rust/issues/101122

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dropck_eyepatch",
        description: r##"# `dropck_eyepatch`

The tracking issue for this feature is: [#34761]

[#34761]: https://github.com/rust-lang/rust/issues/34761

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "duration_constants",
        description: r##"# `duration_constants`

The tracking issue for this feature is: [#57391]

[#57391]: https://github.com/rust-lang/rust/issues/57391

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "duration_constructors",
        description: r##"# `duration_constructors`

The tracking issue for this feature is: [#120301]

[#120301]: https://github.com/rust-lang/rust/issues/120301

------------------------

Add the methods `from_days` and `from_weeks` to `Duration`.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "duration_millis_float",
        description: r##"# `duration_millis_float`

The tracking issue for this feature is: [#122451]

[#122451]: https://github.com/rust-lang/rust/issues/122451

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "duration_units",
        description: r##"# `duration_units`

The tracking issue for this feature is: [#120301]

[#120301]: https://github.com/rust-lang/rust/issues/120301

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dyn_compatible_for_dispatch",
        description: r##"# `dyn_compatible_for_dispatch`

The tracking issue for this feature is: [#43561]

[#43561]: https://github.com/rust-lang/rust/issues/43561

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "dyn_star",
        description: r##"# `dyn_star`

The tracking issue for this feature is: [#102425]

[#102425]: https://github.com/rust-lang/rust/issues/102425

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "edition_panic",
        description: r##"# `edition_panic`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ermsb_target_feature",
        description: r##"# `ermsb_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "error_generic_member_access",
        description: r##"# `error_generic_member_access`

The tracking issue for this feature is: [#99301]

[#99301]: https://github.com/rust-lang/rust/issues/99301

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "error_iter",
        description: r##"# `error_iter`

The tracking issue for this feature is: [#58520]

[#58520]: https://github.com/rust-lang/rust/issues/58520

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "error_reporter",
        description: r##"# `error_reporter`

The tracking issue for this feature is: [#90172]

[#90172]: https://github.com/rust-lang/rust/issues/90172

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "error_type_id",
        description: r##"# `error_type_id`

The tracking issue for this feature is: [#60784]

[#60784]: https://github.com/rust-lang/rust/issues/60784

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exact_size_is_empty",
        description: r##"# `exact_size_is_empty`

The tracking issue for this feature is: [#35428]

[#35428]: https://github.com/rust-lang/rust/issues/35428

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exclusive_wrapper",
        description: r##"# `exclusive_wrapper`

The tracking issue for this feature is: [#98407]

[#98407]: https://github.com/rust-lang/rust/issues/98407

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exhaustive_patterns",
        description: r##"# `exhaustive_patterns`

The tracking issue for this feature is: [#51085]

[#51085]: https://github.com/rust-lang/rust/issues/51085

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exit_status_error",
        description: r##"# `exit_status_error`

The tracking issue for this feature is: [#84908]

[#84908]: https://github.com/rust-lang/rust/issues/84908

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "exitcode_exit_method",
        description: r##"# `exitcode_exit_method`

The tracking issue for this feature is: [#97100]

[#97100]: https://github.com/rust-lang/rust/issues/97100

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "explicit_tail_calls",
        description: r##"# `explicit_tail_calls`

The tracking issue for this feature is: [#112788]

[#112788]: https://github.com/rust-lang/rust/issues/112788

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "extend_one",
        description: r##"# `extend_one`

The tracking issue for this feature is: [#72631]

[#72631]: https://github.com/rust-lang/rust/issues/72631

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "extend_one_unchecked",
        description: r##"# `extend_one_unchecked`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "extern_types",
        description: r##"# `extern_types`

The tracking issue for this feature is: [#43467]

[#43467]: https://github.com/rust-lang/rust/issues/43467

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "extract_if",
        description: r##"# `extract_if`

The tracking issue for this feature is: [#43244]

[#43244]: https://github.com/rust-lang/rust/issues/43244

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "f128",
        description: r##"# `f128`

The tracking issue for this feature is: [#116909]

[#116909]: https://github.com/rust-lang/rust/issues/116909

---

Enable the `f128` type for  IEEE 128-bit floating numbers (quad precision).
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "f16",
        description: r##"# `f16`

The tracking issue for this feature is: [#116909]

[#116909]: https://github.com/rust-lang/rust/issues/116909

---

Enable the `f16` type for  IEEE 16-bit floating numbers (half precision).
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fd",
        description: r##"# `fd`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fd_read",
        description: r##"# `fd_read`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ffi_const",
        description: r##"# `ffi_const`

The tracking issue for this feature is: [#58328]

------

The `#[ffi_const]` attribute applies clang's `const` attribute to foreign
functions declarations.

That is, `#[ffi_const]` functions shall have no effects except for its return
value, which can only depend on the values of the function parameters, and is
not affected by changes to the observable state of the program.

Applying the `#[ffi_const]` attribute to a function that violates these
requirements is undefined behaviour.

This attribute enables Rust to perform common optimizations, like sub-expression
elimination, and it can avoid emitting some calls in repeated invocations of the
function with the same argument values regardless of other operations being
performed in between these functions calls (as opposed to `#[ffi_pure]`
functions).

## Pitfalls

A `#[ffi_const]` function can only read global memory that would not affect
its return value for the whole execution of the program (e.g. immutable global
memory). `#[ffi_const]` functions are referentially-transparent and therefore
more strict than `#[ffi_pure]` functions.

A common pitfall involves applying the `#[ffi_const]` attribute to a
function that reads memory through pointer arguments which do not necessarily
point to immutable global memory.

A `#[ffi_const]` function that returns unit has no effect on the abstract
machine's state, and a `#[ffi_const]` function cannot be `#[ffi_pure]`.

A `#[ffi_const]` function must not diverge, neither via a side effect (e.g. a
call to `abort`) nor by infinite loops.

When translating C headers to Rust FFI, it is worth verifying for which targets
the `const` attribute is enabled in those headers, and using the appropriate
`cfg` macros in the Rust side to match those definitions. While the semantics of
`const` are implemented identically by many C and C++ compilers, e.g., clang,
[GCC], [ARM C/C++ compiler], [IBM ILE C/C++], etc. they are not necessarily
implemented in this way on all of them. It is therefore also worth verifying
that the semantics of the C toolchain used to compile the binary being linked
against are compatible with those of the `#[ffi_const]`.

[#58328]: https://github.com/rust-lang/rust/issues/58328
[ARM C/C++ compiler]: http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0491c/Cacgigch.html
[GCC]: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-const-function-attribute
[IBM ILE C/C++]: https://www.ibm.com/support/knowledgecenter/fr/ssw_ibm_i_71/rzarg/fn_attrib_const.htm
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ffi_pure",
        description: r##"# `ffi_pure`

The tracking issue for this feature is: [#58329]

------

The `#[ffi_pure]` attribute applies clang's `pure` attribute to foreign
functions declarations.

That is, `#[ffi_pure]` functions shall have no effects except for its return
value, which shall not change across two consecutive function calls with
the same parameters.

Applying the `#[ffi_pure]` attribute to a function that violates these
requirements is undefined behavior.

This attribute enables Rust to perform common optimizations, like sub-expression
elimination and loop optimizations. Some common examples of pure functions are
`strlen` or `memcmp`.

These optimizations are only applicable when the compiler can prove that no
program state observable by the `#[ffi_pure]` function has changed between calls
of the function, which could alter the result. See also the `#[ffi_const]`
attribute, which provides stronger guarantees regarding the allowable behavior
of a function, enabling further optimization.

## Pitfalls

A `#[ffi_pure]` function can read global memory through the function
parameters (e.g. pointers), globals, etc. `#[ffi_pure]` functions are not
referentially-transparent, and are therefore more relaxed than `#[ffi_const]`
functions.

However, accessing global memory through volatile or atomic reads can violate the
requirement that two consecutive function calls shall return the same value.

A `pure` function that returns unit has no effect on the abstract machine's
state.

A `#[ffi_pure]` function must not diverge, neither via a side effect (e.g. a
call to `abort`) nor by infinite loops.

When translating C headers to Rust FFI, it is worth verifying for which targets
the `pure` attribute is enabled in those headers, and using the appropriate
`cfg` macros in the Rust side to match those definitions. While the semantics of
`pure` are implemented identically by many C and C++ compilers, e.g., clang,
[GCC], [ARM C/C++ compiler], [IBM ILE C/C++], etc. they are not necessarily
implemented in this way on all of them. It is therefore also worth verifying
that the semantics of the C toolchain used to compile the binary being linked
against are compatible with those of the `#[ffi_pure]`.


[#58329]: https://github.com/rust-lang/rust/issues/58329
[ARM C/C++ compiler]: http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0491c/Cacigdac.html
[GCC]: https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-pure-function-attribute
[IBM ILE C/C++]: https://www.ibm.com/support/knowledgecenter/fr/ssw_ibm_i_71/rzarg/fn_attrib_pure.htm
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "file_buffered",
        description: r##"# `file_buffered`

The tracking issue for this feature is: [#130804]

[#130804]: https://github.com/rust-lang/rust/issues/130804

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "file_lock",
        description: r##"# `file_lock`

The tracking issue for this feature is: [#130994]

[#130994]: https://github.com/rust-lang/rust/issues/130994

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "float_gamma",
        description: r##"# `float_gamma`

The tracking issue for this feature is: [#99842]

[#99842]: https://github.com/rust-lang/rust/issues/99842

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "float_minimum_maximum",
        description: r##"# `float_minimum_maximum`

The tracking issue for this feature is: [#91079]

[#91079]: https://github.com/rust-lang/rust/issues/91079

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "float_next_up_down",
        description: r##"# `float_next_up_down`

The tracking issue for this feature is: [#91399]

[#91399]: https://github.com/rust-lang/rust/issues/91399

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "flt2dec",
        description: r##"# `flt2dec`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fmt_debug",
        description: r##"# `fmt_debug`

The tracking issue for this feature is: [#129709]

[#129709]: https://github.com/rust-lang/rust/issues/129709

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fmt_helpers_for_derive",
        description: r##"# `fmt_helpers_for_derive`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fmt_internals",
        description: r##"# `fmt_internals`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fn_align",
        description: r##"# `fn_align`

The tracking issue for this feature is: [#82232]

[#82232]: https://github.com/rust-lang/rust/issues/82232

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fn_delegation",
        description: r##"# `fn_delegation`

The tracking issue for this feature is: [#118212]

[#118212]: https://github.com/rust-lang/rust/issues/118212

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fn_ptr_trait",
        description: r##"# `fn_ptr_trait`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fn_traits",
        description: r##"# `fn_traits`

The tracking issue for this feature is [#29625]

See Also: [`unboxed_closures`](../language-features/unboxed-closures.md)

[#29625]: https://github.com/rust-lang/rust/issues/29625

----

The `fn_traits` feature allows for implementation of the [`Fn*`] traits
for creating custom closure-like types.

[`Fn*`]: ../../std/ops/trait.Fn.html

```rust
#![feature(unboxed_closures)]
#![feature(fn_traits)]

struct Adder {
    a: u32
}

impl FnOnce<(u32, )> for Adder {
    type Output = u32;
    extern "rust-call" fn call_once(self, b: (u32, )) -> Self::Output {
        self.a + b.0
    }
}

fn main() {
    let adder = Adder { a: 3 };
    assert_eq!(adder(2), 5);
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "forget_unsized",
        description: r##"# `forget_unsized`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "format_args_nl",
        description: r##"# `format_args_nl`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "formatting_options",
        description: r##"# `formatting_options`

The tracking issue for this feature is: [#118117]

[#118117]: https://github.com/rust-lang/rust/issues/118117

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "freeze",
        description: r##"# `freeze`

The tracking issue for this feature is: [#121675]

[#121675]: https://github.com/rust-lang/rust/issues/121675

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "freeze_impls",
        description: r##"# `freeze_impls`

The tracking issue for this feature is: [#121675]

[#121675]: https://github.com/rust-lang/rust/issues/121675

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "fundamental",
        description: r##"# `fundamental`

The tracking issue for this feature is: [#29635]

[#29635]: https://github.com/rust-lang/rust/issues/29635

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "future_join",
        description: r##"# `future_join`

The tracking issue for this feature is: [#91642]

[#91642]: https://github.com/rust-lang/rust/issues/91642

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "gen_blocks",
        description: r##"# `gen_blocks`

The tracking issue for this feature is: [#117078]

[#117078]: https://github.com/rust-lang/rust/issues/117078

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "gen_future",
        description: r##"# `gen_future`

The tracking issue for this feature is: [#50547]

[#50547]: https://github.com/rust-lang/rust/issues/50547

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "generic_arg_infer",
        description: r##"# `generic_arg_infer`

The tracking issue for this feature is: [#85077]

[#85077]: https://github.com/rust-lang/rust/issues/85077

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "generic_assert",
        description: r##"# `generic_assert`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "generic_assert_internals",
        description: r##"# `generic_assert_internals`

The tracking issue for this feature is: [#44838]

[#44838]: https://github.com/rust-lang/rust/issues/44838

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "generic_const_exprs",
        description: r##"# `generic_const_exprs`

The tracking issue for this feature is: [#76560]

[#76560]: https://github.com/rust-lang/rust/issues/76560

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "generic_const_items",
        description: r##"# `generic_const_items`

The tracking issue for this feature is: [#113521]

[#113521]: https://github.com/rust-lang/rust/issues/113521

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "get_many_mut",
        description: r##"# `get_many_mut`

The tracking issue for this feature is: [#104642]

[#104642]: https://github.com/rust-lang/rust/issues/104642

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "get_many_mut_helpers",
        description: r##"# `get_many_mut_helpers`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "get_mut_unchecked",
        description: r##"# `get_mut_unchecked`

The tracking issue for this feature is: [#63292]

[#63292]: https://github.com/rust-lang/rust/issues/63292

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "global_registration",
        description: r##"# `global_registration`

The tracking issue for this feature is: [#125119]

[#125119]: https://github.com/rust-lang/rust/issues/125119

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "guard_patterns",
        description: r##"# `guard_patterns`

The tracking issue for this feature is: [#129967]

[#129967]: https://github.com/rust-lang/rust/issues/129967

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "half_open_range_patterns_in_slices",
        description: r##"# `half_open_range_patterns_in_slices`

The tracking issue for this feature is: [#67264]
It is a future part of the `exclusive_range_pattern` feature,
tracked at [#37854].

[#67264]: https://github.com/rust-lang/rust/issues/67264
[#37854]: https://github.com/rust-lang/rust/issues/37854
-----

This feature allow using top-level half-open range patterns in slices.

```rust
#![feature(half_open_range_patterns_in_slices)]

fn main() {
    let xs = [13, 1, 5, 2, 3, 1, 21, 8];
    let [a @ 3.., b @ ..3, c @ 4..6, ..] = xs else { return; };
}
```

Note that this feature is not required if the patterns are wrapped between parenthesis.

```rust
fn main() {
    let xs = [13, 1];
    let [(a @ 3..), c] = xs else { return; };
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hash_extract_if",
        description: r##"# `hash_extract_if`

The tracking issue for this feature is: [#59618]

[#59618]: https://github.com/rust-lang/rust/issues/59618

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hash_raw_entry",
        description: r##"# `hash_raw_entry`

The tracking issue for this feature is: [#56167]

[#56167]: https://github.com/rust-lang/rust/issues/56167

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hash_set_entry",
        description: r##"# `hash_set_entry`

The tracking issue for this feature is: [#60896]

[#60896]: https://github.com/rust-lang/rust/issues/60896

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hasher_prefixfree_extras",
        description: r##"# `hasher_prefixfree_extras`

The tracking issue for this feature is: [#96762]

[#96762]: https://github.com/rust-lang/rust/issues/96762

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hashmap_internals",
        description: r##"# `hashmap_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hexagon_target_feature",
        description: r##"# `hexagon_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "hint_must_use",
        description: r##"# `hint_must_use`

The tracking issue for this feature is: [#94745]

[#94745]: https://github.com/rust-lang/rust/issues/94745

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "if_let_guard",
        description: r##"# `if_let_guard`

The tracking issue for this feature is: [#51114]

[#51114]: https://github.com/rust-lang/rust/issues/51114

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "impl_trait_in_assoc_type",
        description: r##"# `impl_trait_in_assoc_type`

The tracking issue for this feature is: [#63063]

[#63063]: https://github.com/rust-lang/rust/issues/63063

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "impl_trait_in_fn_trait_return",
        description: r##"# `impl_trait_in_fn_trait_return`

The tracking issue for this feature is: [#99697]

[#99697]: https://github.com/rust-lang/rust/issues/99697

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "inherent_associated_types",
        description: r##"# `inherent_associated_types`

The tracking issue for this feature is: [#8995]

[#8995]: https://github.com/rust-lang/rust/issues/8995

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "inline_const_pat",
        description: r##"# `inline_const_pat`

The tracking issue for this feature is: [#76001]

------

This feature allows you to use inline constant expressions in pattern position:

```rust
#![feature(inline_const_pat)]

const fn one() -> i32 { 1 }

let some_int = 3;
match some_int {
    const { 1 + 2 } => println!("Matched 1 + 2"),
    const { one() } => println!("Matched const fn returning 1"),
    _ => println!("Didn't match anything :("),
}
```

[#76001]: https://github.com/rust-lang/rust/issues/76001
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "inplace_iteration",
        description: r##"# `inplace_iteration`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "int_roundings",
        description: r##"# `int_roundings`

The tracking issue for this feature is: [#88581]

[#88581]: https://github.com/rust-lang/rust/issues/88581

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "integer_atomics",
        description: r##"# `integer_atomics`

The tracking issue for this feature is: [#99069]

[#99069]: https://github.com/rust-lang/rust/issues/99069

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "integer_sign_cast",
        description: r##"# `integer_sign_cast`

The tracking issue for this feature is: [#125882]

[#125882]: https://github.com/rust-lang/rust/issues/125882

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "internal_impls_macro",
        description: r##"# `internal_impls_macro`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "internal_output_capture",
        description: r##"# `internal_output_capture`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "intra_doc_pointers",
        description: r##"# `intra-doc-pointers`

The tracking issue for this feature is: [#80896]

[#80896]: https://github.com/rust-lang/rust/issues/80896

------------------------

Rustdoc does not currently allow disambiguating between `*const` and `*mut`, and
raw pointers in intra-doc links are unstable until it does.

```rust
#![feature(intra_doc_pointers)]
//! [pointer::add]
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "intrinsics",
        description: r##"# `intrinsics`

The tracking issue for this feature is: None.

Intrinsics are rarely intended to be stable directly, but are usually
exported in some sort of stable manner. Prefer using the stable interfaces to
the intrinsic directly when you can.

------------------------


## Intrinsics with fallback logic

Many intrinsics can be written in pure rust, albeit inefficiently or without supporting
some features that only exist on some backends. Backends can simply not implement those
intrinsics without causing any code miscompilations or failures to compile.
All intrinsic fallback bodies are automatically made cross-crate inlineable (like `#[inline]`)
by the codegen backend, but not the MIR inliner.

```rust
#![feature(intrinsics)]
#![allow(internal_features)]

#[rustc_intrinsic]
const unsafe fn const_deallocate(_ptr: *mut u8, _size: usize, _align: usize) {}
```

Since these are just regular functions, it is perfectly ok to create the intrinsic twice:

```rust
#![feature(intrinsics)]
#![allow(internal_features)]

#[rustc_intrinsic]
const unsafe fn const_deallocate(_ptr: *mut u8, _size: usize, _align: usize) {}

mod foo {
    #[rustc_intrinsic]
    const unsafe fn const_deallocate(_ptr: *mut u8, _size: usize, _align: usize) {
        panic!("noisy const dealloc")
    }
}

```

The behaviour on backends that override the intrinsic is exactly the same. On other
backends, the intrinsic behaviour depends on which implementation is called, just like
with any regular function.

## Intrinsics lowered to MIR instructions

Various intrinsics have native MIR operations that they correspond to. Instead of requiring
backends to implement both the intrinsic and the MIR operation, the `lower_intrinsics` pass
will convert the calls to the MIR operation. Backends do not need to know about these intrinsics
at all. These intrinsics only make sense without a body, and can either be declared as a "rust-intrinsic"
or as a `#[rustc_intrinsic]`. The body is never used, as calls to the intrinsic do not exist
anymore after MIR analyses.

## Intrinsics without fallback logic

These must be implemented by all backends.

### `#[rustc_intrinsic]` declarations

These are written like intrinsics with fallback bodies, but the body is irrelevant.
Use `loop {}` for the body or call the intrinsic recursively and add
`#[rustc_intrinsic_must_be_overridden]` to the function to ensure that backends don't
invoke the body.

### Legacy extern ABI based intrinsics

These are imported as if they were FFI functions, with the special
`rust-intrinsic` ABI. For example, if one was in a freestanding
context, but wished to be able to `transmute` between types, and
perform efficient pointer arithmetic, one would import those functions
via a declaration like

```rust
#![feature(intrinsics)]
#![allow(internal_features)]
# fn main() {}

extern "rust-intrinsic" {
    fn transmute<T, U>(x: T) -> U;

    fn arith_offset<T>(dst: *const T, offset: isize) -> *const T;
}
```

As with any other FFI functions, these are by default always `unsafe` to call.
You can add `#[rustc_safe_intrinsic]` to the intrinsic to make it safe to call.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_const_error",
        description: r##"# `io_const_error`

The tracking issue for this feature is: [#133448]

[#133448]: https://github.com/rust-lang/rust/issues/133448

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_const_error_internals",
        description: r##"# `io_const_error_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_error_inprogress",
        description: r##"# `io_error_inprogress`

The tracking issue for this feature is: [#130840]

[#130840]: https://github.com/rust-lang/rust/issues/130840

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_error_more",
        description: r##"# `io_error_more`

The tracking issue for this feature is: [#86442]

[#86442]: https://github.com/rust-lang/rust/issues/86442

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_error_uncategorized",
        description: r##"# `io_error_uncategorized`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "io_slice_as_bytes",
        description: r##"# `io_slice_as_bytes`

The tracking issue for this feature is: [#132818]

[#132818]: https://github.com/rust-lang/rust/issues/132818

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ip",
        description: r##"# `ip`

The tracking issue for this feature is: [#27709]

[#27709]: https://github.com/rust-lang/rust/issues/27709

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ip_from",
        description: r##"# `ip_from`

The tracking issue for this feature is: [#131360]

[#131360]: https://github.com/rust-lang/rust/issues/131360

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "is_ascii_octdigit",
        description: r##"# `is_ascii_octdigit`

The tracking issue for this feature is: [#101288]

[#101288]: https://github.com/rust-lang/rust/issues/101288

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "is_loongarch_feature_detected",
        description: r##"# `is_loongarch_feature_detected`

The tracking issue for this feature is: [#117425]

[#117425]: https://github.com/rust-lang/rust/issues/117425

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "is_riscv_feature_detected",
        description: r##"# `is_riscv_feature_detected`

The tracking issue for this feature is: [#111192]

[#111192]: https://github.com/rust-lang/rust/issues/111192

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_advance_by",
        description: r##"# `iter_advance_by`

The tracking issue for this feature is: [#77404]

[#77404]: https://github.com/rust-lang/rust/issues/77404

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_array_chunks",
        description: r##"# `iter_array_chunks`

The tracking issue for this feature is: [#100450]

[#100450]: https://github.com/rust-lang/rust/issues/100450

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_chain",
        description: r##"# `iter_chain`

The tracking issue for this feature is: [#125964]

[#125964]: https://github.com/rust-lang/rust/issues/125964

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_collect_into",
        description: r##"# `iter_collect_into`

The tracking issue for this feature is: [#94780]

[#94780]: https://github.com/rust-lang/rust/issues/94780

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_from_coroutine",
        description: r##"# `iter_from_coroutine`

The tracking issue for this feature is: [#43122]

[#43122]: https://github.com/rust-lang/rust/issues/43122

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_intersperse",
        description: r##"# `iter_intersperse`

The tracking issue for this feature is: [#79524]

[#79524]: https://github.com/rust-lang/rust/issues/79524

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_is_partitioned",
        description: r##"# `iter_is_partitioned`

The tracking issue for this feature is: [#62544]

[#62544]: https://github.com/rust-lang/rust/issues/62544

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_map_windows",
        description: r##"# `iter_map_windows`

The tracking issue for this feature is: [#87155]

[#87155]: https://github.com/rust-lang/rust/issues/87155

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_next_chunk",
        description: r##"# `iter_next_chunk`

The tracking issue for this feature is: [#98326]

[#98326]: https://github.com/rust-lang/rust/issues/98326

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_order_by",
        description: r##"# `iter_order_by`

The tracking issue for this feature is: [#64295]

[#64295]: https://github.com/rust-lang/rust/issues/64295

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iter_partition_in_place",
        description: r##"# `iter_partition_in_place`

The tracking issue for this feature is: [#62543]

[#62543]: https://github.com/rust-lang/rust/issues/62543

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iterator_try_collect",
        description: r##"# `iterator_try_collect`

The tracking issue for this feature is: [#94047]

[#94047]: https://github.com/rust-lang/rust/issues/94047

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "iterator_try_reduce",
        description: r##"# `iterator_try_reduce`

The tracking issue for this feature is: [#87053]

[#87053]: https://github.com/rust-lang/rust/issues/87053

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "junction_point",
        description: r##"# `junction_point`

The tracking issue for this feature is: [#121709]

[#121709]: https://github.com/rust-lang/rust/issues/121709

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lahfsahf_target_feature",
        description: r##"# `lahfsahf_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lang_items",
        description: r##"# `lang_items`

The tracking issue for this feature is: None.

------------------------

The `rustc` compiler has certain pluggable operations, that is,
functionality that isn't hard-coded into the language, but is
implemented in libraries, with a special marker to tell the compiler
it exists. The marker is the attribute `#[lang = "..."]` and there are
various different values of `...`, i.e. various different 'lang
items'. Most of them can only be defined once.

Lang items are loaded lazily by the compiler; e.g. if one never uses `Box`
then there is no need to define a function for `exchange_malloc`.
`rustc` will emit an error when an item is needed but not found in the current
crate or any that it depends on.

Some features provided by lang items:

- overloadable operators via traits: the traits corresponding to the
  `==`, `<`, dereferencing (`*`) and `+` (etc.) operators are all
  marked with lang items; those specific four are `eq`, `partial_ord`,
  `deref`/`deref_mut`, and `add` respectively.
- panicking: the `panic` and `panic_impl` lang items, among others.
- stack unwinding: the lang item `eh_personality` is a function used by the
  failure mechanisms of the compiler. This is often mapped to GCC's personality
  function (see the [`std` implementation][personality] for more information),
  but programs which don't trigger a panic can be assured that this function is
  never called. Additionally, a `eh_catch_typeinfo` static is needed for certain
  targets which implement Rust panics on top of C++ exceptions.
- the traits in `core::marker` used to indicate types of
  various kinds; e.g. lang items `sized`, `sync` and `copy`.
- memory allocation, see below.

Most lang items are defined by `core`, but if you're trying to build
an executable without the `std` crate, you might run into the need
for lang item definitions.

[personality]: https://github.com/rust-lang/rust/blob/master/library/std/src/sys/personality/gcc.rs

## Example: Implementing a `Box`

`Box` pointers require two lang items: one for the type itself and one for
allocation. A freestanding program that uses the `Box` sugar for dynamic
allocations via `malloc` and `free`:

```rust,ignore (libc-is-finicky)
#![feature(lang_items, start, core_intrinsics, rustc_private, panic_unwind, rustc_attrs)]
#![allow(internal_features)]
#![no_std]

extern crate libc;
extern crate unwind;

use core::ffi::c_void;
use core::intrinsics;
use core::panic::PanicInfo;
use core::ptr::NonNull;

pub struct Global; // the global allocator
struct Unique<T>(NonNull<T>);

#[lang = "owned_box"]
pub struct Box<T, A = Global>(Unique<T>, A);

impl<T> Box<T> {
    pub fn new(x: T) -> Self {
        #[rustc_box]
        Box::new(x)
    }
}

impl<T, A> Drop for Box<T, A> {
    fn drop(&mut self) {
        unsafe {
            libc::free(self.0.0.as_ptr() as *mut c_void);
        }
    }
}

#[lang = "exchange_malloc"]
unsafe fn allocate(size: usize, _align: usize) -> *mut u8 {
    let p = libc::malloc(size) as *mut u8;

    // Check if `malloc` failed:
    if p.is_null() {
        intrinsics::abort();
    }

    p
}

#[start]
fn main(_argc: isize, _argv: *const *const u8) -> isize {
    let _x = Box::new(1);

    0
}

#[lang = "eh_personality"]
fn rust_eh_personality() {}

#[panic_handler]
fn panic_handler(_info: &PanicInfo) -> ! { intrinsics::abort() }
```

Note the use of `abort`: the `exchange_malloc` lang item is assumed to
return a valid pointer, and so needs to do the check internally.

## List of all language items

An up-to-date list of all language items can be found [here] in the compiler code.

[here]: https://github.com/rust-lang/rust/blob/master/compiler/rustc_hir/src/lang_items.rs
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "large_assignments",
        description: r##"# `large_assignments`

The tracking issue for this feature is: [#83518]

[#83518]: https://github.com/rust-lang/rust/issues/83518

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "layout_for_ptr",
        description: r##"# `layout_for_ptr`

The tracking issue for this feature is: [#69835]

[#69835]: https://github.com/rust-lang/rust/issues/69835

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lazy_cell_into_inner",
        description: r##"# `lazy_cell_into_inner`

The tracking issue for this feature is: [#125623]

[#125623]: https://github.com/rust-lang/rust/issues/125623

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lazy_get",
        description: r##"# `lazy_get`

The tracking issue for this feature is: [#129333]

[#129333]: https://github.com/rust-lang/rust/issues/129333

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lazy_type_alias",
        description: r##"# `lazy_type_alias`

The tracking issue for this feature is: [#112792]

[#112792]: https://github.com/rust-lang/rust/issues/112792

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "legacy_receiver_trait",
        description: r##"# `legacy_receiver_trait`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "let_chains",
        description: r##"# `let_chains`

The tracking issue for this feature is: [#53667]

[#53667]: https://github.com/rust-lang/rust/issues/53667

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "liballoc_internals",
        description: r##"# `liballoc_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "libstd_sys_internals",
        description: r##"# `libstd_sys_internals`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "lifetime_capture_rules_2024",
        description: r##"# `lifetime_capture_rules_2024`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "link_arg_attribute",
        description: r##"# `link_arg_attribute`

The tracking issue for this feature is: [#99427]

------

The `link_arg_attribute` feature allows passing arguments into the linker
from inside of the source code. Order is preserved for link attributes as
they were defined on a single extern block:

```rust,no_run
#![feature(link_arg_attribute)]

#[link(kind = "link-arg", name = "--start-group")]
#[link(kind = "static", name = "c")]
#[link(kind = "static", name = "gcc")]
#[link(kind = "link-arg", name = "--end-group")]
extern "C" {}
```

[#99427]: https://github.com/rust-lang/rust/issues/99427
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "link_cfg",
        description: r##"# `link_cfg`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "link_llvm_intrinsics",
        description: r##"# `link_llvm_intrinsics`

The tracking issue for this feature is: [#29602]

[#29602]: https://github.com/rust-lang/rust/issues/29602

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "linkage",
        description: r##"# `linkage`

The tracking issue for this feature is: [#29603]

[#29603]: https://github.com/rust-lang/rust/issues/29603

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "linked_list_cursors",
        description: r##"# `linked_list_cursors`

The tracking issue for this feature is: [#58533]

[#58533]: https://github.com/rust-lang/rust/issues/58533

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "linked_list_remove",
        description: r##"# `linked_list_remove`

The tracking issue for this feature is: [#69210]

[#69210]: https://github.com/rust-lang/rust/issues/69210

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "linked_list_retain",
        description: r##"# `linked_list_retain`

The tracking issue for this feature is: [#114135]

[#114135]: https://github.com/rust-lang/rust/issues/114135

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "linux_pidfd",
        description: r##"# `linux_pidfd`

The tracking issue for this feature is: [#82971]

[#82971]: https://github.com/rust-lang/rust/issues/82971

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "local_waker",
        description: r##"# `local_waker`

The tracking issue for this feature is: [#118959]

[#118959]: https://github.com/rust-lang/rust/issues/118959

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "log_syntax",
        description: r##"# `log_syntax`

The tracking issue for this feature is: [#29598]

[#29598]: https://github.com/rust-lang/rust/issues/29598

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "loongarch_target_feature",
        description: r##"# `loongarch_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "macro_metavar_expr",
        description: r##"# `macro_metavar_expr`

The tracking issue for this feature is: [#83527]

[#83527]: https://github.com/rust-lang/rust/issues/83527

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "macro_metavar_expr_concat",
        description: r##"# `macro_metavar_expr_concat`

The tracking issue for this feature is: [#124225]

[#124225]: https://github.com/rust-lang/rust/issues/124225

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "map_many_mut",
        description: r##"# `map_many_mut`

The tracking issue for this feature is: [#97601]

[#97601]: https://github.com/rust-lang/rust/issues/97601

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "map_try_insert",
        description: r##"# `map_try_insert`

The tracking issue for this feature is: [#82766]

[#82766]: https://github.com/rust-lang/rust/issues/82766

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mapped_lock_guards",
        description: r##"# `mapped_lock_guards`

The tracking issue for this feature is: [#117108]

[#117108]: https://github.com/rust-lang/rust/issues/117108

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "marker_trait_attr",
        description: r##"# `marker_trait_attr`

The tracking issue for this feature is: [#29864]

[#29864]: https://github.com/rust-lang/rust/issues/29864

------------------------

Normally, Rust keeps you from adding trait implementations that could
overlap with each other, as it would be ambiguous which to use.  This
feature, however, carves out an exception to that rule: a trait can
opt-in to having overlapping implementations, at the cost that those
implementations are not allowed to override anything (and thus the
trait itself cannot have any associated items, as they're pointless
when they'd need to do the same thing for every type anyway).

```rust
#![feature(marker_trait_attr)]

#[marker] trait CheapToClone: Clone {}

impl<T: Copy> CheapToClone for T {}

// These could potentially overlap with the blanket implementation above,
// so are only allowed because CheapToClone is a marker trait.
impl<T: CheapToClone, U: CheapToClone> CheapToClone for (T, U) {}
impl<T: CheapToClone> CheapToClone for std::ops::Range<T> {}

fn cheap_clone<T: CheapToClone>(t: T) -> T {
    t.clone()
}
```

This is expected to replace the unstable `overlapping_marker_traits`
feature, which applied to all empty traits (without needing an opt-in).
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_array_assume_init",
        description: r##"# `maybe_uninit_array_assume_init`

The tracking issue for this feature is: [#96097]

[#96097]: https://github.com/rust-lang/rust/issues/96097

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_as_bytes",
        description: r##"# `maybe_uninit_as_bytes`

The tracking issue for this feature is: [#93092]

[#93092]: https://github.com/rust-lang/rust/issues/93092

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_fill",
        description: r##"# `maybe_uninit_fill`

The tracking issue for this feature is: [#117428]

[#117428]: https://github.com/rust-lang/rust/issues/117428

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_slice",
        description: r##"# `maybe_uninit_slice`

The tracking issue for this feature is: [#63569]

[#63569]: https://github.com/rust-lang/rust/issues/63569

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_uninit_array",
        description: r##"# `maybe_uninit_uninit_array`

The tracking issue for this feature is: [#96097]

[#96097]: https://github.com/rust-lang/rust/issues/96097

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_uninit_array_transpose",
        description: r##"# `maybe_uninit_uninit_array_transpose`

The tracking issue for this feature is: [#96097]

[#96097]: https://github.com/rust-lang/rust/issues/96097

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "maybe_uninit_write_slice",
        description: r##"# `maybe_uninit_write_slice`

The tracking issue for this feature is: [#79995]

[#79995]: https://github.com/rust-lang/rust/issues/79995

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mem_copy_fn",
        description: r##"# `mem_copy_fn`

The tracking issue for this feature is: [#98262]

[#98262]: https://github.com/rust-lang/rust/issues/98262

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "min_generic_const_args",
        description: r##"# `min_generic_const_args`

The tracking issue for this feature is: [#132980]

[#132980]: https://github.com/rust-lang/rust/issues/132980

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "min_specialization",
        description: r##"# `min_specialization`

The tracking issue for this feature is: [#31844]

[#31844]: https://github.com/rust-lang/rust/issues/31844

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mips_target_feature",
        description: r##"# `mips_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mixed_integer_ops_unsigned_sub",
        description: r##"# `mixed_integer_ops_unsigned_sub`

The tracking issue for this feature is: [#126043]

[#126043]: https://github.com/rust-lang/rust/issues/126043

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "more_float_constants",
        description: r##"# `more_float_constants`

The tracking issue for this feature is: [#103883]

[#103883]: https://github.com/rust-lang/rust/issues/103883

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "more_maybe_bounds",
        description: r##"# `more_maybe_bounds`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "more_qualified_paths",
        description: r##"# `more_qualified_paths`

The `more_qualified_paths` feature can be used in order to enable the
use of qualified paths in patterns.

The tracking issue for this feature is: [#86935](https://github.com/rust-lang/rust/issues/86935).

------------------------

## Example

```rust
#![feature(more_qualified_paths)]

fn main() {
    // destructure through a qualified path
    let <Foo as A>::Assoc { br } = StructStruct { br: 2 };
}

struct StructStruct {
    br: i8,
}

struct Foo;

trait A {
    type Assoc;
}

impl A for Foo {
    type Assoc = StructStruct;
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mpmc_channel",
        description: r##"# `mpmc_channel`

The tracking issue for this feature is: [#126840]

[#126840]: https://github.com/rust-lang/rust/issues/126840

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "multiple_supertrait_upcastable",
        description: r##"# `multiple_supertrait_upcastable`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "must_not_suspend",
        description: r##"# `must_not_suspend`

The tracking issue for this feature is: [#83310]

[#83310]: https://github.com/rust-lang/rust/issues/83310

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "mut_ref",
        description: r##"# `mut_ref`

The tracking issue for this feature is: [#123076]

[#123076]: https://github.com/rust-lang/rust/issues/123076

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "naked_functions",
        description: r##"# `naked_functions`

The tracking issue for this feature is: [#90957]

[#90957]: https://github.com/rust-lang/rust/issues/90957

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "native_link_modifiers_as_needed",
        description: r##"# `native_link_modifiers_as_needed`

The tracking issue for this feature is: [#81490]

[#81490]: https://github.com/rust-lang/rust/issues/81490

------------------------

The `native_link_modifiers_as_needed` feature allows you to use the `as-needed` modifier.

`as-needed` is only compatible with the `dynamic` and `framework` linking kinds. Using any other kind will result in a compiler error.

`+as-needed` means that the library will be actually linked only if it satisfies some undefined symbols at the point at which it is specified on the command line, making it similar to static libraries in this regard.

This modifier translates to `--as-needed` for ld-like linkers, and to `-dead_strip_dylibs` / `-needed_library` / `-needed_framework` for ld64.
The modifier does nothing for linkers that don't support it (e.g. `link.exe`).

The default for this modifier is unclear, some targets currently specify it as `+as-needed`, some do not. We may want to try making `+as-needed` a default for all targets.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "needs_panic_runtime",
        description: r##"# `needs_panic_runtime`

The tracking issue for this feature is: [#32837]

[#32837]: https://github.com/rust-lang/rust/issues/32837

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "negative_bounds",
        description: r##"# `negative_bounds`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "negative_impls",
        description: r##"# `negative_impls`

The tracking issue for this feature is [#68318].

[#68318]: https://github.com/rust-lang/rust/issues/68318

----

With the feature gate `negative_impls`, you can write negative impls as well as positive ones:

```rust
#![feature(negative_impls)]
trait DerefMut { }
impl<T: ?Sized> !DerefMut for &T { }
```

Negative impls indicate a semver guarantee that the given trait will not be implemented for the given types. Negative impls play an additional purpose for auto traits, described below.

Negative impls have the following characteristics:

* They do not have any items.
* They must obey the orphan rules as if they were a positive impl.
* They cannot "overlap" with any positive impls.

## Semver interaction

It is a breaking change to remove a negative impl. Negative impls are a commitment not to implement the given trait for the named types.

## Orphan and overlap rules

Negative impls must obey the same orphan rules as a positive impl. This implies you cannot add a negative impl for types defined in upstream crates and so forth.

Similarly, negative impls cannot overlap with positive impls, again using the same "overlap" check that we ordinarily use to determine if two impls overlap. (Note that positive impls typically cannot overlap with one another either, except as permitted by specialization.)

## Interaction with auto traits

Declaring a negative impl `impl !SomeAutoTrait for SomeType` for an
auto-trait serves two purposes:

* as with any trait, it declares that `SomeType` will never implement `SomeAutoTrait`;
* it disables the automatic `SomeType: SomeAutoTrait` impl that would otherwise have been generated.

Note that, at present, there is no way to indicate that a given type
does not implement an auto trait *but that it may do so in the
future*. For ordinary types, this is done by simply not declaring any
impl at all, but that is not an option for auto traits. A workaround
is that one could embed a marker type as one of the fields, where the
marker type is `!AutoTrait`.

## Immediate uses

Negative impls are used to declare that `&T: !DerefMut`  and `&mut T: !Clone`, as required to fix the soundness of `Pin` described in [#66544](https://github.com/rust-lang/rust/issues/66544).

This serves two purposes:

* For proving the correctness of unsafe code, we can use that impl as evidence that no `DerefMut` or `Clone` impl exists.
* It prevents downstream crates from creating such impls.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "never_patterns",
        description: r##"# `never_patterns`

The tracking issue for this feature is: [#118155]

[#118155]: https://github.com/rust-lang/rust/issues/118155

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "never_type",
        description: r##"# `never_type`

The tracking issue for this feature is: [#35121]

[#35121]: https://github.com/rust-lang/rust/issues/35121

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "never_type_fallback",
        description: r##"# `never_type_fallback`

The tracking issue for this feature is: [#65992]

[#65992]: https://github.com/rust-lang/rust/issues/65992

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "new_range_api",
        description: r##"# `new_range_api`

The tracking issue for this feature is: [#125687]

[#125687]: https://github.com/rust-lang/rust/issues/125687

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "new_zeroed_alloc",
        description: r##"# `new_zeroed_alloc`

The tracking issue for this feature is: [#129396]

[#129396]: https://github.com/rust-lang/rust/issues/129396

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "no_core",
        description: r##"# `no_core`

The tracking issue for this feature is: [#29639]

[#29639]: https://github.com/rust-lang/rust/issues/29639

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "no_sanitize",
        description: r##"# `no_sanitize`

The tracking issue for this feature is: [#39699]

[#39699]: https://github.com/rust-lang/rust/issues/39699

------------------------

The `no_sanitize` attribute can be used to selectively disable sanitizer
instrumentation in an annotated function. This might be useful to: avoid
instrumentation overhead in a performance critical function, or avoid
instrumenting code that contains constructs unsupported by given sanitizer.

The precise effect of this annotation depends on particular sanitizer in use.
For example, with `no_sanitize(thread)`, the thread sanitizer will no longer
instrument non-atomic store / load operations, but it will instrument atomic
operations to avoid reporting false positives and provide meaning full stack
traces.

## Examples

``` rust
#![feature(no_sanitize)]

#[no_sanitize(address)]
fn foo() {
  // ...
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_exhaustive_omitted_patterns_lint",
        description: r##"# `non_exhaustive_omitted_patterns_lint`

The tracking issue for this feature is: [#89554]

[#89554]: https://github.com/rust-lang/rust/issues/89554

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_lifetime_binders",
        description: r##"# `non_lifetime_binders`

The tracking issue for this feature is: [#108185]

[#108185]: https://github.com/rust-lang/rust/issues/108185

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_null_from_ref",
        description: r##"# `non_null_from_ref`

The tracking issue for this feature is: [#130823]

[#130823]: https://github.com/rust-lang/rust/issues/130823

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "non_zero_count_ones",
        description: r##"# `non_zero_count_ones`

The tracking issue for this feature is: [#120287]

[#120287]: https://github.com/rust-lang/rust/issues/120287

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "nonzero_bitwise",
        description: r##"# `nonzero_bitwise`

The tracking issue for this feature is: [#128281]

[#128281]: https://github.com/rust-lang/rust/issues/128281

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "nonzero_from_mut",
        description: r##"# `nonzero_from_mut`

The tracking issue for this feature is: [#106290]

[#106290]: https://github.com/rust-lang/rust/issues/106290

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "nonzero_internals",
        description: r##"# `nonzero_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "nonzero_ops",
        description: r##"# `nonzero_ops`

The tracking issue for this feature is: [#84186]

[#84186]: https://github.com/rust-lang/rust/issues/84186

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "num_midpoint_signed",
        description: r##"# `num_midpoint_signed`

The tracking issue for this feature is: [#110840]

[#110840]: https://github.com/rust-lang/rust/issues/110840

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "numfmt",
        description: r##"# `numfmt`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "offset_of_enum",
        description: r##"# `offset_of_enum`

The tracking issue for this feature is: [#120141]

[#120141]: https://github.com/rust-lang/rust/issues/120141

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "offset_of_slice",
        description: r##"# `offset_of_slice`

The tracking issue for this feature is: [#126151]

[#126151]: https://github.com/rust-lang/rust/issues/126151

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "omit_gdb_pretty_printer_section",
        description: r##"# `omit_gdb_pretty_printer_section`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "once_cell_get_mut",
        description: r##"# `once_cell_get_mut`

The tracking issue for this feature is: [#121641]

[#121641]: https://github.com/rust-lang/rust/issues/121641

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "once_cell_try",
        description: r##"# `once_cell_try`

The tracking issue for this feature is: [#109737]

[#109737]: https://github.com/rust-lang/rust/issues/109737

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "once_cell_try_insert",
        description: r##"# `once_cell_try_insert`

The tracking issue for this feature is: [#116693]

[#116693]: https://github.com/rust-lang/rust/issues/116693

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "once_wait",
        description: r##"# `once_wait`

The tracking issue for this feature is: [#127527]

[#127527]: https://github.com/rust-lang/rust/issues/127527

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "one_sided_range",
        description: r##"# `one_sided_range`

The tracking issue for this feature is: [#69780]

[#69780]: https://github.com/rust-lang/rust/issues/69780

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "optimize_attribute",
        description: r##"# `optimize_attribute`

The tracking issue for this feature is: [#54882]

[#54882]: https://github.com/rust-lang/rust/issues/54882

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "option_array_transpose",
        description: r##"# `option_array_transpose`

The tracking issue for this feature is: [#130828]

[#130828]: https://github.com/rust-lang/rust/issues/130828

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "option_zip",
        description: r##"# `option_zip`

The tracking issue for this feature is: [#70086]

[#70086]: https://github.com/rust-lang/rust/issues/70086

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "os_str_display",
        description: r##"# `os_str_display`

The tracking issue for this feature is: [#120048]

[#120048]: https://github.com/rust-lang/rust/issues/120048

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "os_str_slice",
        description: r##"# `os_str_slice`

The tracking issue for this feature is: [#118485]

[#118485]: https://github.com/rust-lang/rust/issues/118485

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "os_string_pathbuf_leak",
        description: r##"# `os_string_pathbuf_leak`

The tracking issue for this feature is: [#125965]

[#125965]: https://github.com/rust-lang/rust/issues/125965

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "os_string_truncate",
        description: r##"# `os_string_truncate`

The tracking issue for this feature is: [#133262]

[#133262]: https://github.com/rust-lang/rust/issues/133262

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_abort",
        description: r##"# `panic_abort`

The tracking issue for this feature is: [#32837]

[#32837]: https://github.com/rust-lang/rust/issues/32837

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_always_abort",
        description: r##"# `panic_always_abort`

The tracking issue for this feature is: [#84438]

[#84438]: https://github.com/rust-lang/rust/issues/84438

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_backtrace_config",
        description: r##"# `panic_backtrace_config`

The tracking issue for this feature is: [#93346]

[#93346]: https://github.com/rust-lang/rust/issues/93346

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_can_unwind",
        description: r##"# `panic_can_unwind`

The tracking issue for this feature is: [#92988]

[#92988]: https://github.com/rust-lang/rust/issues/92988

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_internals",
        description: r##"# `panic_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_payload_as_str",
        description: r##"# `panic_payload_as_str`

The tracking issue for this feature is: [#125175]

[#125175]: https://github.com/rust-lang/rust/issues/125175

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_runtime",
        description: r##"# `panic_runtime`

The tracking issue for this feature is: [#32837]

[#32837]: https://github.com/rust-lang/rust/issues/32837

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_unwind",
        description: r##"# `panic_unwind`

The tracking issue for this feature is: [#32837]

[#32837]: https://github.com/rust-lang/rust/issues/32837

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "panic_update_hook",
        description: r##"# `panic_update_hook`

The tracking issue for this feature is: [#92649]

[#92649]: https://github.com/rust-lang/rust/issues/92649

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "patchable_function_entry",
        description: r##"# `patchable_function_entry`

The tracking issue for this feature is: [#123115]

[#123115]: https://github.com/rust-lang/rust/issues/123115

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "path_add_extension",
        description: r##"# `path_add_extension`

The tracking issue for this feature is: [#127292]

[#127292]: https://github.com/rust-lang/rust/issues/127292

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "path_file_prefix",
        description: r##"# `path_file_prefix`

The tracking issue for this feature is: [#86319]

[#86319]: https://github.com/rust-lang/rust/issues/86319

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pattern",
        description: r##"# `pattern`

The tracking issue for this feature is: [#27721]

[#27721]: https://github.com/rust-lang/rust/issues/27721

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pattern_complexity_limit",
        description: r##"# `pattern_complexity_limit`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pattern_type_macro",
        description: r##"# `pattern_type_macro`

The tracking issue for this feature is: [#123646]

[#123646]: https://github.com/rust-lang/rust/issues/123646

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pattern_types",
        description: r##"# `pattern_types`

The tracking issue for this feature is: [#123646]

[#123646]: https://github.com/rust-lang/rust/issues/123646

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "peer_credentials_unix_socket",
        description: r##"# `peer_credentials_unix_socket`

The tracking issue for this feature is: [#42839]

[#42839]: https://github.com/rust-lang/rust/issues/42839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pin_coerce_unsized_trait",
        description: r##"# `pin_coerce_unsized_trait`

The tracking issue for this feature is: [#123430]

[#123430]: https://github.com/rust-lang/rust/issues/123430

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pin_ergonomics",
        description: r##"# `pin_ergonomics`

The tracking issue for this feature is: [#130494]

[#130494]: https://github.com/rust-lang/rust/issues/130494

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pointer_is_aligned_to",
        description: r##"# `pointer_is_aligned_to`

The tracking issue for this feature is: [#96284]

[#96284]: https://github.com/rust-lang/rust/issues/96284

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pointer_like_trait",
        description: r##"# `pointer_like_trait`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "portable_simd",
        description: r##"# `portable_simd`

The tracking issue for this feature is: [#86656]

[#86656]: https://github.com/rust-lang/rust/issues/86656

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "postfix_match",
        description: r##"# `postfix-match`

`postfix-match` adds the feature for matching upon values postfix
the expressions that generate the values.

The tracking issue for this feature is: [#121618](https://github.com/rust-lang/rust/issues/121618).

------------------------

```rust,edition2021
#![feature(postfix_match)]

enum Foo {
    Bar,
    Baz
}

fn get_foo() -> Foo {
    Foo::Bar
}

get_foo().match {
    Foo::Bar => {},
    Foo::Baz => panic!(),
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "powerpc_target_feature",
        description: r##"# `powerpc_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "precise_capturing_in_traits",
        description: r##"# `precise_capturing_in_traits`

The tracking issue for this feature is: [#130044]

[#130044]: https://github.com/rust-lang/rust/issues/130044

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "prelude_2024",
        description: r##"# `prelude_2024`

The tracking issue for this feature is: [#121042]

[#121042]: https://github.com/rust-lang/rust/issues/121042

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "prelude_import",
        description: r##"# `prelude_import`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "prfchw_target_feature",
        description: r##"# `prfchw_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "print_internals",
        description: r##"# `print_internals`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_def_site",
        description: r##"# `proc_macro_def_site`

The tracking issue for this feature is: [#54724]

[#54724]: https://github.com/rust-lang/rust/issues/54724

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_diagnostic",
        description: r##"# `proc_macro_diagnostic`

The tracking issue for this feature is: [#54140]

[#54140]: https://github.com/rust-lang/rust/issues/54140

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_expand",
        description: r##"# `proc_macro_expand`

The tracking issue for this feature is: [#90765]

[#90765]: https://github.com/rust-lang/rust/issues/90765

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_hygiene",
        description: r##"# `proc_macro_hygiene`

The tracking issue for this feature is: [#54727]

[#54727]: https://github.com/rust-lang/rust/issues/54727

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_internals",
        description: r##"# `proc_macro_internals`

The tracking issue for this feature is: [#27812]

[#27812]: https://github.com/rust-lang/rust/issues/27812

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_quote",
        description: r##"# `proc_macro_quote`

The tracking issue for this feature is: [#54722]

[#54722]: https://github.com/rust-lang/rust/issues/54722

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_span",
        description: r##"# `proc_macro_span`

The tracking issue for this feature is: [#54725]

[#54725]: https://github.com/rust-lang/rust/issues/54725

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_totokens",
        description: r##"# `proc_macro_totokens`

The tracking issue for this feature is: [#130977]

[#130977]: https://github.com/rust-lang/rust/issues/130977

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "proc_macro_tracked_env",
        description: r##"# `proc_macro_tracked_env`

The tracking issue for this feature is: [#99515]

[#99515]: https://github.com/rust-lang/rust/issues/99515

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "process_exitcode_internals",
        description: r##"# `process_exitcode_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "process_internals",
        description: r##"# `process_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "profiler_runtime",
        description: r##"# `profiler_runtime`

The tracking issue for this feature is: [#42524](https://github.com/rust-lang/rust/issues/42524).

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "profiler_runtime_lib",
        description: r##"# `profiler_runtime_lib`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_alignment_type",
        description: r##"# `ptr_alignment_type`

The tracking issue for this feature is: [#102070]

[#102070]: https://github.com/rust-lang/rust/issues/102070

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_as_ref_unchecked",
        description: r##"# `ptr_as_ref_unchecked`

The tracking issue for this feature is: [#122034]

[#122034]: https://github.com/rust-lang/rust/issues/122034

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_as_uninit",
        description: r##"# `ptr_as_uninit`

The tracking issue for this feature is: [#75402]

[#75402]: https://github.com/rust-lang/rust/issues/75402

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_internals",
        description: r##"# `ptr_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_mask",
        description: r##"# `ptr_mask`

The tracking issue for this feature is: [#98290]

[#98290]: https://github.com/rust-lang/rust/issues/98290

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_metadata",
        description: r##"# `ptr_metadata`

The tracking issue for this feature is: [#81513]

[#81513]: https://github.com/rust-lang/rust/issues/81513

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ptr_sub_ptr",
        description: r##"# `ptr_sub_ptr`

The tracking issue for this feature is: [#95892]

[#95892]: https://github.com/rust-lang/rust/issues/95892

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "pub_crate_should_not_need_unstable_attr",
        description: r##"# `pub_crate_should_not_need_unstable_attr`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "random",
        description: r##"# `random`

The tracking issue for this feature is: [#130703]

[#130703]: https://github.com/rust-lang/rust/issues/130703

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "raw_os_error_ty",
        description: r##"# `raw_os_error_ty`

The tracking issue for this feature is: [#107792]

[#107792]: https://github.com/rust-lang/rust/issues/107792

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "raw_slice_split",
        description: r##"# `raw_slice_split`

The tracking issue for this feature is: [#95595]

[#95595]: https://github.com/rust-lang/rust/issues/95595

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "raw_vec_internals",
        description: r##"# `raw_vec_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "read_buf",
        description: r##"# `read_buf`

The tracking issue for this feature is: [#78485]

[#78485]: https://github.com/rust-lang/rust/issues/78485

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "reentrant_lock",
        description: r##"# `reentrant_lock`

The tracking issue for this feature is: [#121440]

[#121440]: https://github.com/rust-lang/rust/issues/121440

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ref_pat_eat_one_layer_2024",
        description: r##"# `ref_pat_eat_one_layer_2024`

The tracking issue for this feature is: [#123076]

[#123076]: https://github.com/rust-lang/rust/issues/123076

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ref_pat_eat_one_layer_2024_structural",
        description: r##"# `ref_pat_eat_one_layer_2024_structural`

The tracking issue for this feature is: [#123076]

[#123076]: https://github.com/rust-lang/rust/issues/123076

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "register_tool",
        description: r##"# `register_tool`

The tracking issue for this feature is: [#66079]

[#66079]: https://github.com/rust-lang/rust/issues/66079

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "repr128",
        description: r##"# `repr128`

The tracking issue for this feature is: [#56071]

[#56071]: https://github.com/rust-lang/rust/issues/56071

------------------------

The `repr128` feature adds support for `#[repr(u128)]` on `enum`s.

```rust
#![feature(repr128)]

#[repr(u128)]
enum Foo {
    Bar(u64),
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "repr_simd",
        description: r##"# `repr_simd`

The tracking issue for this feature is: [#27731]

[#27731]: https://github.com/rust-lang/rust/issues/27731

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "restricted_std",
        description: r##"# `restricted_std`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "result_flattening",
        description: r##"# `result_flattening`

The tracking issue for this feature is: [#70142]

[#70142]: https://github.com/rust-lang/rust/issues/70142

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "return_type_notation",
        description: r##"# `return_type_notation`

The tracking issue for this feature is: [#109417]

[#109417]: https://github.com/rust-lang/rust/issues/109417

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "riscv_target_feature",
        description: r##"# `riscv_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "round_char_boundary",
        description: r##"# `round_char_boundary`

The tracking issue for this feature is: [#93743]

[#93743]: https://github.com/rust-lang/rust/issues/93743

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rt",
        description: r##"# `rt`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rtm_target_feature",
        description: r##"# `rtm_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rust_cold_cc",
        description: r##"# `rust_cold_cc`

The tracking issue for this feature is: [#97544]

[#97544]: https://github.com/rust-lang/rust/issues/97544

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustc_allow_const_fn_unstable",
        description: r##"# `rustc_allow_const_fn_unstable`

The tracking issue for this feature is: [#69399]

[#69399]: https://github.com/rust-lang/rust/issues/69399

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustc_attrs",
        description: r##"# `rustc_attrs`

This feature has no tracking issue, and is therefore internal to
the compiler, not being intended for general use.

Note: `rustc_attrs` enables many rustc-internal attributes and this page
only discuss a few of them.

------------------------

The `rustc_attrs` feature allows debugging rustc type layouts by using
`#[rustc_layout(...)]` to debug layout at compile time (it even works
with `cargo check`) as an alternative to `rustc -Z print-type-sizes`
that is way more verbose.

Options provided by `#[rustc_layout(...)]` are `debug`, `size`, `align`,
`abi`. Note that it only works on sized types without generics.

## Examples

```rust,compile_fail
#![feature(rustc_attrs)]

#[rustc_layout(abi, size)]
pub enum X {
    Y(u8, u8, u8),
    Z(isize),
}
```

When that is compiled, the compiler will error with something like

```text
error: abi: Aggregate { sized: true }
 --> src/lib.rs:4:1
  |
4 | / pub enum T {
5 | |     Y(u8, u8, u8),
6 | |     Z(isize),
7 | | }
  | |_^

error: size: Size { raw: 16 }
 --> src/lib.rs:4:1
  |
4 | / pub enum T {
5 | |     Y(u8, u8, u8),
6 | |     Z(isize),
7 | | }
  | |_^

error: aborting due to 2 previous errors
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustc_encodable_decodable",
        description: r##"# `rustc_encodable_decodable`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustc_private",
        description: r##"# `rustc_private`

The tracking issue for this feature is: [#27812]

[#27812]: https://github.com/rust-lang/rust/issues/27812

------------------------

This feature allows access to unstable internal compiler crates.

Additionally it changes the linking behavior of crates which have this feature enabled. It will prevent linking to a dylib if there's a static variant of it already statically linked into another dylib dependency. This is required to successfully link to `rustc_driver`.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc_internals",
        description: r##"# `rustdoc_internals`

The tracking issue for this feature is: [#90418]

[#90418]: https://github.com/rust-lang/rust/issues/90418

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rustdoc_missing_doc_code_examples",
        description: r##"# `rustdoc_missing_doc_code_examples`

The tracking issue for this feature is: [#101730]

[#101730]: https://github.com/rust-lang/rust/issues/101730

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "rwlock_downgrade",
        description: r##"# `rwlock_downgrade`

The tracking issue for this feature is: [#128203]

[#128203]: https://github.com/rust-lang/rust/issues/128203

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "s390x_target_feature",
        description: r##"# `s390x_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sealed",
        description: r##"# `sealed`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "seek_stream_len",
        description: r##"# `seek_stream_len`

The tracking issue for this feature is: [#59359]

[#59359]: https://github.com/rust-lang/rust/issues/59359

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "set_ptr_value",
        description: r##"# `set_ptr_value`

The tracking issue for this feature is: [#75091]

[#75091]: https://github.com/rust-lang/rust/issues/75091

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "setgroups",
        description: r##"# `setgroups`

The tracking issue for this feature is: [#90747]

[#90747]: https://github.com/rust-lang/rust/issues/90747

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sgx_platform",
        description: r##"# `sgx_platform`

The tracking issue for this feature is: [#56975]

[#56975]: https://github.com/rust-lang/rust/issues/56975

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sha512_sm_x86",
        description: r##"# `sha512_sm_x86`

The tracking issue for this feature is: [#126624]

[#126624]: https://github.com/rust-lang/rust/issues/126624

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "simd_ffi",
        description: r##"# `simd_ffi`

The tracking issue for this feature is: [#27731]

[#27731]: https://github.com/rust-lang/rust/issues/27731

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sized_type_properties",
        description: r##"# `sized_type_properties`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_as_array",
        description: r##"# `slice_as_array`

The tracking issue for this feature is: [#133508]

[#133508]: https://github.com/rust-lang/rust/issues/133508

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_as_chunks",
        description: r##"# `slice_as_chunks`

The tracking issue for this feature is: [#74985]

[#74985]: https://github.com/rust-lang/rust/issues/74985

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_concat_ext",
        description: r##"# `slice_concat_ext`

The tracking issue for this feature is: [#27747]

[#27747]: https://github.com/rust-lang/rust/issues/27747

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_concat_trait",
        description: r##"# `slice_concat_trait`

The tracking issue for this feature is: [#27747]

[#27747]: https://github.com/rust-lang/rust/issues/27747

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_from_ptr_range",
        description: r##"# `slice_from_ptr_range`

The tracking issue for this feature is: [#89792]

[#89792]: https://github.com/rust-lang/rust/issues/89792

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_index_methods",
        description: r##"# `slice_index_methods`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_internals",
        description: r##"# `slice_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_iter_mut_as_mut_slice",
        description: r##"# `slice_iter_mut_as_mut_slice`

The tracking issue for this feature is: [#93079]

[#93079]: https://github.com/rust-lang/rust/issues/93079

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_partition_dedup",
        description: r##"# `slice_partition_dedup`

The tracking issue for this feature is: [#54279]

[#54279]: https://github.com/rust-lang/rust/issues/54279

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_pattern",
        description: r##"# `slice_pattern`

The tracking issue for this feature is: [#56345]

[#56345]: https://github.com/rust-lang/rust/issues/56345

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_ptr_get",
        description: r##"# `slice_ptr_get`

The tracking issue for this feature is: [#74265]

[#74265]: https://github.com/rust-lang/rust/issues/74265

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_range",
        description: r##"# `slice_range`

The tracking issue for this feature is: [#76393]

[#76393]: https://github.com/rust-lang/rust/issues/76393

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_split_once",
        description: r##"# `slice_split_once`

The tracking issue for this feature is: [#112811]

[#112811]: https://github.com/rust-lang/rust/issues/112811

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_swap_unchecked",
        description: r##"# `slice_swap_unchecked`

The tracking issue for this feature is: [#88539]

[#88539]: https://github.com/rust-lang/rust/issues/88539

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "slice_take",
        description: r##"# `slice_take`

The tracking issue for this feature is: [#62280]

[#62280]: https://github.com/rust-lang/rust/issues/62280

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "solid_ext",
        description: r##"# `solid_ext`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sort_floats",
        description: r##"# `sort_floats`

The tracking issue for this feature is: [#93396]

[#93396]: https://github.com/rust-lang/rust/issues/93396

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sparc_target_feature",
        description: r##"# `sparc_target_feature`

The tracking issue for this feature is: [#132783]

[#132783]: https://github.com/rust-lang/rust/issues/132783

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "specialization",
        description: r##"# `specialization`

The tracking issue for this feature is: [#31844]

[#31844]: https://github.com/rust-lang/rust/issues/31844

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "split_array",
        description: r##"# `split_array`

The tracking issue for this feature is: [#90091]

[#90091]: https://github.com/rust-lang/rust/issues/90091

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "split_as_slice",
        description: r##"# `split_as_slice`

The tracking issue for this feature is: [#96137]

[#96137]: https://github.com/rust-lang/rust/issues/96137

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sse4a_target_feature",
        description: r##"# `sse4a_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "staged_api",
        description: r##"# `staged_api`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "start",
        description: r##"# `start`

The tracking issue for this feature is: [#29633]

[#29633]: https://github.com/rust-lang/rust/issues/29633

------------------------

Allows you to mark a function as the entry point of the executable, which is
necessary in `#![no_std]` environments.

The function marked `#[start]` is passed the command line parameters in the same
format as the C main function (aside from the integer types being used).
It has to be non-generic and have the following signature:

```rust,ignore (only-for-syntax-highlight)
# let _:
fn(isize, *const *const u8) -> isize
# ;
```

This feature should not be confused with the `start` *lang item* which is
defined by the `std` crate and is written `#[lang = "start"]`.

## Usage together with the `std` crate

`#[start]` can be used in combination with the `std` crate, in which case the
normal `main` function (which would get called from the `std` crate) won't be
used as an entry point.
The initialization code in `std` will be skipped this way.

Example:

```rust
#![feature(start)]

#[start]
fn start(_argc: isize, _argv: *const *const u8) -> isize {
    0
}
```

Unwinding the stack past the `#[start]` function is currently considered
Undefined Behavior (for any unwinding implementation):

```rust,ignore (UB)
#![feature(start)]

#[start]
fn start(_argc: isize, _argv: *const *const u8) -> isize {
    std::panic::catch_unwind(|| {
        panic!(); // panic safely gets caught or safely aborts execution
    });

    panic!(); // UB!

    0
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "std_internals",
        description: r##"# `std_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stdarch_arm_feature_detection",
        description: r##"# `stdarch_arm_feature_detection`

The tracking issue for this feature is: [#111190]

[#111190]: https://github.com/rust-lang/rust/issues/111190

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stdarch_mips_feature_detection",
        description: r##"# `stdarch_mips_feature_detection`

The tracking issue for this feature is: [#111188]

[#111188]: https://github.com/rust-lang/rust/issues/111188

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stdarch_powerpc_feature_detection",
        description: r##"# `stdarch_powerpc_feature_detection`

The tracking issue for this feature is: [#111191]

[#111191]: https://github.com/rust-lang/rust/issues/111191

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stdio_makes_pipe",
        description: r##"# `stdio_makes_pipe`

The tracking issue for this feature is: [#98288]

[#98288]: https://github.com/rust-lang/rust/issues/98288

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "step_trait",
        description: r##"# `step_trait`

The tracking issue for this feature is: [#42168]

[#42168]: https://github.com/rust-lang/rust/issues/42168

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "stmt_expr_attributes",
        description: r##"# `stmt_expr_attributes`

The tracking issue for this feature is: [#15701]

[#15701]: https://github.com/rust-lang/rust/issues/15701

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_as_str",
        description: r##"# `str_as_str`

The tracking issue for this feature is: [#130366]

[#130366]: https://github.com/rust-lang/rust/issues/130366

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_from_raw_parts",
        description: r##"# `str_from_raw_parts`

The tracking issue for this feature is: [#119206]

[#119206]: https://github.com/rust-lang/rust/issues/119206

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_from_utf16_endian",
        description: r##"# `str_from_utf16_endian`

The tracking issue for this feature is: [#116258]

[#116258]: https://github.com/rust-lang/rust/issues/116258

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_internals",
        description: r##"# `str_internals`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_lines_remainder",
        description: r##"# `str_lines_remainder`

The tracking issue for this feature is: [#77998]

[#77998]: https://github.com/rust-lang/rust/issues/77998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_split_inclusive_remainder",
        description: r##"# `str_split_inclusive_remainder`

The tracking issue for this feature is: [#77998]

[#77998]: https://github.com/rust-lang/rust/issues/77998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_split_remainder",
        description: r##"# `str_split_remainder`

The tracking issue for this feature is: [#77998]

[#77998]: https://github.com/rust-lang/rust/issues/77998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "str_split_whitespace_remainder",
        description: r##"# `str_split_whitespace_remainder`

The tracking issue for this feature is: [#77998]

[#77998]: https://github.com/rust-lang/rust/issues/77998

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "strict_provenance_atomic_ptr",
        description: r##"# `strict_provenance_atomic_ptr`

The tracking issue for this feature is: [#99108]

[#99108]: https://github.com/rust-lang/rust/issues/99108

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "strict_provenance_lints",
        description: r##"# `strict_provenance_lints`

The tracking issue for this feature is: [#95228]

[#95228]: https://github.com/rust-lang/rust/issues/95228
-----

The `strict_provenance_lints` feature allows to enable the `fuzzy_provenance_casts` and `lossy_provenance_casts` lints.
These lint on casts between integers and pointers, that are recommended against or invalid in the strict provenance model.

## Example

```rust
#![feature(strict_provenance_lints)]
#![warn(fuzzy_provenance_casts)]

fn main() {
    let _dangling = 16_usize as *const u8;
    //~^ WARNING: strict provenance disallows casting integer `usize` to pointer `*const u8`
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "string_deref_patterns",
        description: r##"# `string_deref_patterns`

The tracking issue for this feature is: [#87121]

[#87121]: https://github.com/rust-lang/rust/issues/87121

------------------------

This feature permits pattern matching `String` to `&str` through [its `Deref` implementation].

```rust
#![feature(string_deref_patterns)]

pub enum Value {
    String(String),
    Number(u32),
}

pub fn is_it_the_answer(value: Value) -> bool {
    match value {
        Value::String("42") => true,
        Value::Number(42) => true,
        _ => false,
    }
}
```

Without this feature other constructs such as match guards have to be used.

```rust
# pub enum Value {
#    String(String),
#    Number(u32),
# }
#
pub fn is_it_the_answer(value: Value) -> bool {
    match value {
        Value::String(s) if s == "42" => true,
        Value::Number(42) => true,
        _ => false,
    }
}
```

[its `Deref` implementation]: https://doc.rust-lang.org/std/string/struct.String.html#impl-Deref-for-String
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "string_extend_from_within",
        description: r##"# `string_extend_from_within`

The tracking issue for this feature is: [#103806]

[#103806]: https://github.com/rust-lang/rust/issues/103806

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "string_from_utf8_lossy_owned",
        description: r##"# `string_from_utf8_lossy_owned`

The tracking issue for this feature is: [#129436]

[#129436]: https://github.com/rust-lang/rust/issues/129436

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "string_remove_matches",
        description: r##"# `string_remove_matches`

The tracking issue for this feature is: [#72826]

[#72826]: https://github.com/rust-lang/rust/issues/72826

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "structural_match",
        description: r##"# `structural_match`

The tracking issue for this feature is: [#31434]

[#31434]: https://github.com/rust-lang/rust/issues/31434

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "substr_range",
        description: r##"# `substr_range`

The tracking issue for this feature is: [#126769]

[#126769]: https://github.com/rust-lang/rust/issues/126769

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "sync_unsafe_cell",
        description: r##"# `sync_unsafe_cell`

The tracking issue for this feature is: [#95439]

[#95439]: https://github.com/rust-lang/rust/issues/95439

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "target_feature_11",
        description: r##"# `target_feature_11`

The tracking issue for this feature is: [#69098]

[#69098]: https://github.com/rust-lang/rust/issues/69098

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tbm_target_feature",
        description: r##"# `tbm_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tcp_deferaccept",
        description: r##"# `tcp_deferaccept`

The tracking issue for this feature is: [#119639]

[#119639]: https://github.com/rust-lang/rust/issues/119639

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tcp_linger",
        description: r##"# `tcp_linger`

The tracking issue for this feature is: [#88494]

[#88494]: https://github.com/rust-lang/rust/issues/88494

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tcp_quickack",
        description: r##"# `tcp_quickack`

The tracking issue for this feature is: [#96256]

[#96256]: https://github.com/rust-lang/rust/issues/96256

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tcplistener_into_incoming",
        description: r##"# `tcplistener_into_incoming`

The tracking issue for this feature is: [#88373]

[#88373]: https://github.com/rust-lang/rust/issues/88373

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "test",
        description: r##"# `test`

The tracking issue for this feature is: None.

------------------------

The internals of the `test` crate are unstable, behind the `test` flag.  The
most widely used part of the `test` crate are benchmark tests, which can test
the performance of your code.  Let's make our `src/lib.rs` look like this
(comments elided):

```rust,no_run
#![feature(test)]

extern crate test;

pub fn add_two(a: i32) -> i32 {
    a + 2
}

#[cfg(test)]
mod tests {
    use super::*;
    use test::Bencher;

    #[test]
    fn it_works() {
        assert_eq!(4, add_two(2));
    }

    #[bench]
    fn bench_add_two(b: &mut Bencher) {
        b.iter(|| add_two(2));
    }
}
```

Note the `test` feature gate, which enables this unstable feature.

We've imported the `test` crate, which contains our benchmarking support.
We have a new function as well, with the `bench` attribute. Unlike regular
tests, which take no arguments, benchmark tests take a `&mut Bencher`. This
`Bencher` provides an `iter` method, which takes a closure. This closure
contains the code we'd like to benchmark.

We can run benchmark tests with `cargo bench`:

```bash
$ cargo bench
   Compiling adder v0.0.1 (file:///home/steve/tmp/adder)
     Running target/release/adder-91b3e234d4ed382a

running 2 tests
test tests::it_works ... ignored
test tests::bench_add_two ... bench:         1 ns/iter (+/- 0)

test result: ok. 0 passed; 0 failed; 1 ignored; 1 measured
```

Our non-benchmark test was ignored. You may have noticed that `cargo bench`
takes a bit longer than `cargo test`. This is because Rust runs our benchmark
a number of times, and then takes the average. Because we're doing so little
work in this example, we have a `1 ns/iter (+/- 0)`, but this would show
the variance if there was one.

Advice on writing benchmarks:


* Move setup code outside the `iter` loop; only put the part you want to measure inside
* Make the code do "the same thing" on each iteration; do not accumulate or change state
* Make the outer function idempotent too; the benchmark runner is likely to run
  it many times
*  Make the inner `iter` loop short and fast so benchmark runs are fast and the
   calibrator can adjust the run-length at fine resolution
* Make the code in the `iter` loop do something simple, to assist in pinpointing
  performance improvements (or regressions)

## Gotcha: optimizations

There's another tricky part to writing benchmarks: benchmarks compiled with
optimizations activated can be dramatically changed by the optimizer so that
the benchmark is no longer benchmarking what one expects. For example, the
compiler might recognize that some calculation has no external effects and
remove it entirely.

```rust,no_run
#![feature(test)]

extern crate test;
use test::Bencher;

#[bench]
fn bench_xor_1000_ints(b: &mut Bencher) {
    b.iter(|| {
        (0..1000).fold(0, |old, new| old ^ new);
    });
}
```

gives the following results

```text
running 1 test
test bench_xor_1000_ints ... bench:         0 ns/iter (+/- 0)

test result: ok. 0 passed; 0 failed; 0 ignored; 1 measured
```

The benchmarking runner offers two ways to avoid this. Either, the closure that
the `iter` method receives can return an arbitrary value which forces the
optimizer to consider the result used and ensures it cannot remove the
computation entirely. This could be done for the example above by adjusting the
`b.iter` call to

```rust
# struct X;
# impl X { fn iter<T, F>(&self, _: F) where F: FnMut() -> T {} } let b = X;
b.iter(|| {
    // Note lack of `;` (could also use an explicit `return`).
    (0..1000).fold(0, |old, new| old ^ new)
});
```

Or, the other option is to call the generic `test::black_box` function, which
is an opaque "black box" to the optimizer and so forces it to consider any
argument as used.

```rust
#![feature(test)]

extern crate test;

# fn main() {
# struct X;
# impl X { fn iter<T, F>(&self, _: F) where F: FnMut() -> T {} } let b = X;
b.iter(|| {
    let n = test::black_box(1000);

    (0..n).fold(0, |a, b| a ^ b)
})
# }
```

Neither of these read or modify the value, and are very cheap for small values.
Larger values can be passed indirectly to reduce overhead (e.g.
`black_box(&huge_struct)`).

Performing either of the above changes gives the following benchmarking results

```text
running 1 test
test bench_xor_1000_ints ... bench:       131 ns/iter (+/- 3)

test result: ok. 0 passed; 0 failed; 0 ignored; 1 measured
```

However, the optimizer can still modify a testcase in an undesirable manner
even when using either of the above.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "test_unstable_lint",
        description: r##"# `test_unstable_lint`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thin_box",
        description: r##"# `thin_box`

The tracking issue for this feature is: [#92791]

[#92791]: https://github.com/rust-lang/rust/issues/92791

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_id_value",
        description: r##"# `thread_id_value`

The tracking issue for this feature is: [#67939]

[#67939]: https://github.com/rust-lang/rust/issues/67939

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_local",
        description: r##"# `thread_local`

The tracking issue for this feature is: [#29594]

[#29594]: https://github.com/rust-lang/rust/issues/29594

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_local_internals",
        description: r##"# `thread_local_internals`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_raw",
        description: r##"# `thread_raw`

The tracking issue for this feature is: [#97523]

[#97523]: https://github.com/rust-lang/rust/issues/97523

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_sleep_until",
        description: r##"# `thread_sleep_until`

The tracking issue for this feature is: [#113752]

[#113752]: https://github.com/rust-lang/rust/issues/113752

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "thread_spawn_hook",
        description: r##"# `thread_spawn_hook`

The tracking issue for this feature is: [#132951]

[#132951]: https://github.com/rust-lang/rust/issues/132951

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trace_macros",
        description: r##"# `trace_macros`

The tracking issue for this feature is [#29598].

[#29598]: https://github.com/rust-lang/rust/issues/29598

------------------------

With `trace_macros` you can trace the expansion of macros in your code.

## Examples

```rust
#![feature(trace_macros)]

fn main() {
    trace_macros!(true);
    println!("Hello, Rust!");
    trace_macros!(false);
}
```

The `cargo build` output:

```txt
note: trace_macro
 --> src/main.rs:5:5
  |
5 |     println!("Hello, Rust!");
  |     ^^^^^^^^^^^^^^^^^^^^^^^^^
  |
  = note: expanding `println! { "Hello, Rust!" }`
  = note: to `print ! ( concat ! ( "Hello, Rust!" , "\n" ) )`
  = note: expanding `print! { concat ! ( "Hello, Rust!" , "\n" ) }`
  = note: to `$crate :: io :: _print ( format_args ! ( concat ! ( "Hello, Rust!" , "\n" ) )
          )`

    Finished dev [unoptimized + debuginfo] target(s) in 0.60 secs
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "track_path",
        description: r##"# `track_path`

The tracking issue for this feature is: [#99515]

[#99515]: https://github.com/rust-lang/rust/issues/99515

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trait_alias",
        description: r##"# `trait_alias`

The tracking issue for this feature is: [#41517]

[#41517]: https://github.com/rust-lang/rust/issues/41517

------------------------

The `trait_alias` feature adds support for trait aliases. These allow aliases
to be created for one or more traits (currently just a single regular trait plus
any number of auto-traits), and used wherever traits would normally be used as
either bounds or trait objects.

```rust
#![feature(trait_alias)]

trait Foo = std::fmt::Debug + Send;
trait Bar = Foo + Sync;

// Use trait alias as bound on type parameter.
fn foo<T: Foo>(v: &T) {
    println!("{:?}", v);
}

pub fn main() {
    foo(&1);

    // Use trait alias for trait objects.
    let a: &Bar = &123;
    println!("{:?}", a);
    let b = Box::new(456) as Box<dyn Foo>;
    println!("{:?}", b);
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trait_upcasting",
        description: r##"# `trait_upcasting`

The tracking issue for this feature is: [#65991]

[#65991]: https://github.com/rust-lang/rust/issues/65991

------------------------

The `trait_upcasting` feature adds support for trait upcasting coercion. This allows a
trait object of type `dyn Bar` to be cast to a trait object of type `dyn Foo`
so long as `Bar: Foo`.

```rust,edition2018
#![feature(trait_upcasting)]

trait Foo {}

trait Bar: Foo {}

impl Foo for i32 {}

impl<T: Foo + ?Sized> Bar for T {}

let bar: &dyn Bar = &123;
let foo: &dyn Foo = bar;
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "transmutability",
        description: r##"# `transmutability`

The tracking issue for this feature is: [#99571]

[#99571]: https://github.com/rust-lang/rust/issues/99571

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "transmute_generic_consts",
        description: r##"# `transmute_generic_consts`

The tracking issue for this feature is: [#109929]

[#109929]: https://github.com/rust-lang/rust/issues/109929

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "transparent_unions",
        description: r##"# `transparent_unions`

The tracking issue for this feature is [#60405]

[#60405]: https://github.com/rust-lang/rust/issues/60405

----

The `transparent_unions` feature allows you mark `union`s as
`#[repr(transparent)]`. A `union` may be `#[repr(transparent)]` in exactly the
same conditions in which a `struct` may be `#[repr(transparent)]` (generally,
this means the `union` must have exactly one non-zero-sized field). Some
concrete illustrations follow.

```rust
#![feature(transparent_unions)]

// This union has the same representation as `f32`.
#[repr(transparent)]
union SingleFieldUnion {
    field: f32,
}

// This union has the same representation as `usize`.
#[repr(transparent)]
union MultiFieldUnion {
    field: usize,
    nothing: (),
}
```

For consistency with transparent `struct`s, `union`s must have exactly one
non-zero-sized field. If all fields are zero-sized, the `union` must not be
`#[repr(transparent)]`:

```rust
#![feature(transparent_unions)]

// This (non-transparent) union is already valid in stable Rust:
pub union GoodUnion {
    pub nothing: (),
}

// Error: transparent union needs exactly one non-zero-sized field, but has 0
// #[repr(transparent)]
// pub union BadUnion {
//     pub nothing: (),
// }
```

The one exception is if the `union` is generic over `T` and has a field of type
`T`, it may be `#[repr(transparent)]` even if `T` is a zero-sized type:

```rust
#![feature(transparent_unions)]

// This union has the same representation as `T`.
#[repr(transparent)]
pub union GenericUnion<T: Copy> { // Unions with non-`Copy` fields are unstable.
    pub field: T,
    pub nothing: (),
}

// This is okay even though `()` is a zero-sized type.
pub const THIS_IS_OKAY: GenericUnion<()> = GenericUnion { field: () };
```

Like transparent `struct`s, a transparent `union` of type `U` has the same
layout, size, and ABI as its single non-ZST field. If it is generic over a type
`T`, and all its fields are ZSTs except for exactly one field of type `T`, then
it has the same layout and ABI as `T` (even if `T` is a ZST when monomorphized).

Like transparent `struct`s, transparent `union`s are FFI-safe if and only if
their underlying representation type is also FFI-safe.

A `union` may not be eligible for the same nonnull-style optimizations that a
`struct` or `enum` (with the same fields) are eligible for. Adding
`#[repr(transparent)]` to  `union` does not change this. To give a more concrete
example, it is unspecified whether `size_of::<T>()` is equal to
`size_of::<Option<T>>()`, where `T` is a `union` (regardless of whether or not
it is transparent). The Rust compiler is free to perform this optimization if
possible, but is not required to, and different compiler versions may differ in
their application of these optimizations.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trivial_bounds",
        description: r##"# `trivial_bounds`

The tracking issue for this feature is: [#48214]

[#48214]: https://github.com/rust-lang/rust/issues/48214

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trusted_fused",
        description: r##"# `trusted_fused`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trusted_len",
        description: r##"# `trusted_len`

The tracking issue for this feature is: [#37572]

[#37572]: https://github.com/rust-lang/rust/issues/37572

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trusted_len_next_unchecked",
        description: r##"# `trusted_len_next_unchecked`

The tracking issue for this feature is: [#37572]

[#37572]: https://github.com/rust-lang/rust/issues/37572

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trusted_random_access",
        description: r##"# `trusted_random_access`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "trusted_step",
        description: r##"# `trusted_step`

The tracking issue for this feature is: [#85731]

[#85731]: https://github.com/rust-lang/rust/issues/85731

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_blocks",
        description: r##"# `try_blocks`

The tracking issue for this feature is: [#31436]

[#31436]: https://github.com/rust-lang/rust/issues/31436

------------------------

The `try_blocks` feature adds support for `try` blocks. A `try`
block creates a new scope one can use the `?` operator in.

```rust,edition2018
#![feature(try_blocks)]

use std::num::ParseIntError;

let result: Result<i32, ParseIntError> = try {
    "1".parse::<i32>()?
        + "2".parse::<i32>()?
        + "3".parse::<i32>()?
};
assert_eq!(result, Ok(6));

let result: Result<i32, ParseIntError> = try {
    "1".parse::<i32>()?
        + "foo".parse::<i32>()?
        + "3".parse::<i32>()?
};
assert!(result.is_err());
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_find",
        description: r##"# `try_find`

The tracking issue for this feature is: [#63178]

[#63178]: https://github.com/rust-lang/rust/issues/63178

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_reserve_kind",
        description: r##"# `try_reserve_kind`

The tracking issue for this feature is: [#48043]

[#48043]: https://github.com/rust-lang/rust/issues/48043

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_trait_v2",
        description: r##"# `try_trait_v2`

The tracking issue for this feature is: [#84277]

[#84277]: https://github.com/rust-lang/rust/issues/84277

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_trait_v2_residual",
        description: r##"# `try_trait_v2_residual`

The tracking issue for this feature is: [#91285]

[#91285]: https://github.com/rust-lang/rust/issues/91285

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_trait_v2_yeet",
        description: r##"# `try_trait_v2_yeet`

The tracking issue for this feature is: [#96374]

[#96374]: https://github.com/rust-lang/rust/issues/96374

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "try_with_capacity",
        description: r##"# `try_with_capacity`

The tracking issue for this feature is: [#91913]

[#91913]: https://github.com/rust-lang/rust/issues/91913

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "tuple_trait",
        description: r##"# `tuple_trait`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "type_alias_impl_trait",
        description: r##"# `type_alias_impl_trait`

The tracking issue for this feature is: [#63063]

[#63063]: https://github.com/rust-lang/rust/issues/63063

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "type_ascription",
        description: r##"# `type_ascription`

The tracking issue for this feature is: [#23416]

[#23416]: https://github.com/rust-lang/rust/issues/23416

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "type_changing_struct_update",
        description: r##"# `type_changing_struct_update`

The tracking issue for this feature is: [#86555]

[#86555]: https://github.com/rust-lang/rust/issues/86555

------------------------

This implements [RFC2528]. When turned on, you can create instances of the same struct
that have different generic type or lifetime parameters.

[RFC2528]: https://github.com/rust-lang/rfcs/blob/master/text/2528-type-changing-struct-update-syntax.md

```rust
#![allow(unused_variables, dead_code)]
#![feature(type_changing_struct_update)]

fn main () {
    struct Foo<T, U> {
        field1: T,
        field2: U,
    }

    let base: Foo<String, i32> = Foo {
        field1: String::from("hello"),
        field2: 1234,
    };
    let updated: Foo<f64, i32> = Foo {
        field1: 3.14,
        ..base
    };
}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "ub_checks",
        description: r##"# `ub_checks`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "uefi_std",
        description: r##"# `uefi_std`

The tracking issue for this feature is: [#100499]

[#100499]: https://github.com/rust-lang/rust/issues/100499

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unbounded_shifts",
        description: r##"# `unbounded_shifts`

The tracking issue for this feature is: [#129375]

[#129375]: https://github.com/rust-lang/rust/issues/129375

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unboxed_closures",
        description: r##"# `unboxed_closures`

The tracking issue for this feature is [#29625]

See Also: [`fn_traits`](../library-features/fn-traits.md)

[#29625]: https://github.com/rust-lang/rust/issues/29625

----

The `unboxed_closures` feature allows you to write functions using the `"rust-call"` ABI,
required for implementing the [`Fn*`] family of traits. `"rust-call"` functions must have
exactly one (non self) argument, a tuple representing the argument list.

[`Fn*`]: ../../std/ops/trait.Fn.html

```rust
#![feature(unboxed_closures)]

extern "rust-call" fn add_args(args: (u32, u32)) -> u32 {
    args.0 + args.1
}

fn main() {}
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unchecked_neg",
        description: r##"# `unchecked_neg`

The tracking issue for this feature is: [#85122]

[#85122]: https://github.com/rust-lang/rust/issues/85122

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unchecked_shifts",
        description: r##"# `unchecked_shifts`

The tracking issue for this feature is: [#85122]

[#85122]: https://github.com/rust-lang/rust/issues/85122

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unicode_internals",
        description: r##"# `unicode_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unique_rc_arc",
        description: r##"# `unique_rc_arc`

The tracking issue for this feature is: [#112566]

[#112566]: https://github.com/rust-lang/rust/issues/112566

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unix_file_vectored_at",
        description: r##"# `unix_file_vectored_at`

The tracking issue for this feature is: [#89517]

[#89517]: https://github.com/rust-lang/rust/issues/89517

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unix_set_mark",
        description: r##"# `unix_set_mark`

The tracking issue for this feature is: [#96467]

[#96467]: https://github.com/rust-lang/rust/issues/96467

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unix_socket_ancillary_data",
        description: r##"# `unix_socket_ancillary_data`

The tracking issue for this feature is: [#76915]

[#76915]: https://github.com/rust-lang/rust/issues/76915

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unix_socket_peek",
        description: r##"# `unix_socket_peek`

The tracking issue for this feature is: [#76923]

[#76923]: https://github.com/rust-lang/rust/issues/76923

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unqualified_local_imports",
        description: r##"# `unqualified_local_imports`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsafe_fields",
        description: r##"# `unsafe_fields`

The tracking issue for this feature is: [#132922]

[#132922]: https://github.com/rust-lang/rust/issues/132922

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsafe_pin_internals",
        description: r##"# `unsafe_pin_internals`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsigned_is_multiple_of",
        description: r##"# `unsigned_is_multiple_of`

The tracking issue for this feature is: [#128101]

[#128101]: https://github.com/rust-lang/rust/issues/128101

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsigned_nonzero_div_ceil",
        description: r##"# `unsigned_nonzero_div_ceil`

The tracking issue for this feature is: [#132968]

[#132968]: https://github.com/rust-lang/rust/issues/132968

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsigned_signed_diff",
        description: r##"# `unsigned_signed_diff`

The tracking issue for this feature is: [#126041]

[#126041]: https://github.com/rust-lang/rust/issues/126041

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsize",
        description: r##"# `unsize`

The tracking issue for this feature is: [#18598]

[#18598]: https://github.com/rust-lang/rust/issues/18598

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsized_const_params",
        description: r##"# `unsized_const_params`

The tracking issue for this feature is: [#95174]

[#95174]: https://github.com/rust-lang/rust/issues/95174

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsized_fn_params",
        description: r##"# `unsized_fn_params`

The tracking issue for this feature is: [#48055]

[#48055]: https://github.com/rust-lang/rust/issues/48055

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unsized_locals",
        description: r##"# `unsized_locals`

The tracking issue for this feature is: [#48055]

[#48055]: https://github.com/rust-lang/rust/issues/48055

------------------------

This implements [RFC1909]. When turned on, you can have unsized arguments and locals:

[RFC1909]: https://github.com/rust-lang/rfcs/blob/master/text/1909-unsized-rvalues.md

```rust
#![allow(incomplete_features)]
#![feature(unsized_locals, unsized_fn_params)]

use std::any::Any;

fn main() {
    let x: Box<dyn Any> = Box::new(42);
    let x: dyn Any = *x;
    //  ^ unsized local variable
    //               ^^ unsized temporary
    foo(x);
}

fn foo(_: dyn Any) {}
//     ^^^^^^ unsized argument
```

The RFC still forbids the following unsized expressions:

```rust,compile_fail
#![feature(unsized_locals)]

use std::any::Any;

struct MyStruct<T: ?Sized> {
    content: T,
}

struct MyTupleStruct<T: ?Sized>(T);

fn answer() -> Box<dyn Any> {
    Box::new(42)
}

fn main() {
    // You CANNOT have unsized statics.
    static X: dyn Any = *answer();  // ERROR
    const Y: dyn Any = *answer();  // ERROR

    // You CANNOT have struct initialized unsized.
    MyStruct { content: *answer() };  // ERROR
    MyTupleStruct(*answer());  // ERROR
    (42, *answer());  // ERROR

    // You CANNOT have unsized return types.
    fn my_function() -> dyn Any { *answer() }  // ERROR

    // You CAN have unsized local variables...
    let mut x: dyn Any = *answer();  // OK
    // ...but you CANNOT reassign to them.
    x = *answer();  // ERROR

    // You CANNOT even initialize them separately.
    let y: dyn Any;  // OK
    y = *answer();  // ERROR

    // Not mentioned in the RFC, but by-move captured variables are also Sized.
    let x: dyn Any = *answer();
    (move || {  // ERROR
        let y = x;
    })();

    // You CAN create a closure with unsized arguments,
    // but you CANNOT call it.
    // This is an implementation detail and may be changed in the future.
    let f = |x: dyn Any| {};
    f(*answer());  // ERROR
}
```

## By-value trait objects

With this feature, you can have by-value `self` arguments without `Self: Sized` bounds.

```rust
#![feature(unsized_fn_params)]

trait Foo {
    fn foo(self) {}
}

impl<T: ?Sized> Foo for T {}

fn main() {
    let slice: Box<[i32]> = Box::new([1, 2, 3]);
    <[i32] as Foo>::foo(*slice);
}
```

And `Foo` will also be object-safe.

```rust
#![feature(unsized_fn_params)]

trait Foo {
    fn foo(self) {}
}

impl<T: ?Sized> Foo for T {}

fn main () {
    let slice: Box<dyn Foo> = Box::new([1, 2, 3]);
    // doesn't compile yet
    <dyn Foo as Foo>::foo(*slice);
}
```

One of the objectives of this feature is to allow `Box<dyn FnOnce>`.

## Variable length arrays

The RFC also describes an extension to the array literal syntax: `[e; dyn n]`. In the syntax, `n` isn't necessarily a constant expression. The array is dynamically allocated on the stack and has the type of `[T]`, instead of `[T; n]`.

```rust,ignore (not-yet-implemented)
#![feature(unsized_locals)]

fn mergesort<T: Ord>(a: &mut [T]) {
    let mut tmp = [T; dyn a.len()];
    // ...
}

fn main() {
    let mut a = [3, 1, 5, 6];
    mergesort(&mut a);
    assert_eq!(a, [1, 3, 5, 6]);
}
```

VLAs are not implemented yet. The syntax isn't final, either. We may need an alternative syntax for Rust 2015 because, in Rust 2015, expressions like `[e; dyn(1)]` would be ambiguous. One possible alternative proposed in the RFC is `[e; n]`: if `n` captures one or more local variables, then it is considered as `[e; dyn n]`.

## Advisory on stack usage

It's advised not to casually use the `#![feature(unsized_locals)]` feature. Typical use-cases are:

- When you need a by-value trait objects.
- When you really need a fast allocation of small temporary arrays.

Another pitfall is repetitive allocation and temporaries. Currently the compiler simply extends the stack frame every time it encounters an unsized assignment. So for example, the code

```rust
#![feature(unsized_locals)]

fn main() {
    let x: Box<[i32]> = Box::new([1, 2, 3, 4, 5]);
    let _x = {{{{{{{{{{*x}}}}}}}}}};
}
```

and the code

```rust
#![feature(unsized_locals)]

fn main() {
    for _ in 0..10 {
        let x: Box<[i32]> = Box::new([1, 2, 3, 4, 5]);
        let _x = *x;
    }
}
```

will unnecessarily extend the stack frame.
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "unwrap_infallible",
        description: r##"# `unwrap_infallible`

The tracking issue for this feature is: [#61695]

[#61695]: https://github.com/rust-lang/rust/issues/61695

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "update_panic_count",
        description: r##"# `update_panic_count`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "used_with_arg",
        description: r##"# `used_with_arg`

The tracking issue for this feature is: [#93798]

[#93798]: https://github.com/rust-lang/rust/issues/93798

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "utf16_extra",
        description: r##"# `utf16_extra`

The tracking issue for this feature is: [#94919]

[#94919]: https://github.com/rust-lang/rust/issues/94919

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "variant_count",
        description: r##"# `variant_count`

The tracking issue for this feature is: [#73662]

[#73662]: https://github.com/rust-lang/rust/issues/73662

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "vec_deque_iter_as_slices",
        description: r##"# `vec_deque_iter_as_slices`

The tracking issue for this feature is: [#123947]

[#123947]: https://github.com/rust-lang/rust/issues/123947

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "vec_into_raw_parts",
        description: r##"# `vec_into_raw_parts`

The tracking issue for this feature is: [#65816]

[#65816]: https://github.com/rust-lang/rust/issues/65816

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "vec_pop_if",
        description: r##"# `vec_pop_if`

The tracking issue for this feature is: [#122741]

[#122741]: https://github.com/rust-lang/rust/issues/122741

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "vec_push_within_capacity",
        description: r##"# `vec_push_within_capacity`

The tracking issue for this feature is: [#100486]

[#100486]: https://github.com/rust-lang/rust/issues/100486

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "vec_split_at_spare",
        description: r##"# `vec_split_at_spare`

The tracking issue for this feature is: [#81944]

[#81944]: https://github.com/rust-lang/rust/issues/81944

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "wasi_ext",
        description: r##"# `wasi_ext`

The tracking issue for this feature is: [#71213]

[#71213]: https://github.com/rust-lang/rust/issues/71213

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "wasm_target_feature",
        description: r##"# `wasm_target_feature`

The tracking issue for this feature is: [#44839]

[#44839]: https://github.com/rust-lang/rust/issues/44839

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_by_handle",
        description: r##"# `windows_by_handle`

The tracking issue for this feature is: [#63010]

[#63010]: https://github.com/rust-lang/rust/issues/63010

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_c",
        description: r##"# `windows_c`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_change_time",
        description: r##"# `windows_change_time`

The tracking issue for this feature is: [#121478]

[#121478]: https://github.com/rust-lang/rust/issues/121478

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_handle",
        description: r##"# `windows_handle`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_net",
        description: r##"# `windows_net`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_exit_code_from",
        description: r##"# `windows_process_exit_code_from`

The tracking issue for this feature is: [#111688]

[#111688]: https://github.com/rust-lang/rust/issues/111688

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_extensions_async_pipes",
        description: r##"# `windows_process_extensions_async_pipes`

The tracking issue for this feature is: [#98289]

[#98289]: https://github.com/rust-lang/rust/issues/98289

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_extensions_force_quotes",
        description: r##"# `windows_process_extensions_force_quotes`

The tracking issue for this feature is: [#82227]

[#82227]: https://github.com/rust-lang/rust/issues/82227

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_extensions_main_thread_handle",
        description: r##"# `windows_process_extensions_main_thread_handle`

The tracking issue for this feature is: [#96723]

[#96723]: https://github.com/rust-lang/rust/issues/96723

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_extensions_raw_attribute",
        description: r##"# `windows_process_extensions_raw_attribute`

The tracking issue for this feature is: [#114854]

[#114854]: https://github.com/rust-lang/rust/issues/114854

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_process_extensions_show_window",
        description: r##"# `windows_process_extensions_show_window`

The tracking issue for this feature is: [#127544]

[#127544]: https://github.com/rust-lang/rust/issues/127544

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "windows_stdio",
        description: r##"# `windows_stdio`

This feature is internal to the Rust compiler and is not intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "with_negative_coherence",
        description: r##"# `with_negative_coherence`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "wrapping_int_impl",
        description: r##"# `wrapping_int_impl`

The tracking issue for this feature is: [#32463]

[#32463]: https://github.com/rust-lang/rust/issues/32463

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "wrapping_next_power_of_two",
        description: r##"# `wrapping_next_power_of_two`

The tracking issue for this feature is: [#32463]

[#32463]: https://github.com/rust-lang/rust/issues/32463

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "write_all_vectored",
        description: r##"# `write_all_vectored`

The tracking issue for this feature is: [#70436]

[#70436]: https://github.com/rust-lang/rust/issues/70436

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "x86_amx_intrinsics",
        description: r##"# `x86_amx_intrinsics`

The tracking issue for this feature is: [#126622]

[#126622]: https://github.com/rust-lang/rust/issues/126622

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "xop_target_feature",
        description: r##"# `xop_target_feature`

The tracking issue for this feature is: [#127208]

[#127208]: https://github.com/rust-lang/rust/issues/127208

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "yeet_desugar_details",
        description: r##"# `yeet_desugar_details`

This feature has no tracking issue, and is therefore likely internal to the compiler, not being intended for general use.

------------------------
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "yeet_expr",
        description: r##"# `yeet_expr`

The tracking issue for this feature is: [#96373]

[#96373]: https://github.com/rust-lang/rust/issues/96373

------------------------

The `yeet_expr` feature adds support for `do yeet` expressions,
which can be used to early-exit from a function or `try` block.

These are highly experimental, thus the placeholder syntax.

```rust,edition2021
#![feature(yeet_expr)]

fn foo() -> Result<String, i32> {
    do yeet 4;
}
assert_eq!(foo(), Err(4));

fn bar() -> Option<String> {
    do yeet;
}
assert_eq!(bar(), None);
```
"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
];

pub const CLIPPY_LINTS: &[Lint] = &[
    Lint {
        label: "clippy::absolute_paths",
        description: r##"Checks for usage of items through absolute paths, like `std::env::current_dir`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::absurd_extreme_comparisons",
        description: r##"Checks for comparisons where one side of the relation is
either the minimum or maximum value for its type and warns if it involves a
case that is always true or always false. Only integer and boolean types are
checked."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::alloc_instead_of_core",
        description: r##"Finds items imported through `alloc` when available through `core`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::allow_attributes",
        description: r##"Checks for usage of the `#[allow]` attribute and suggests replacing it with
the `#[expect]` (See [RFC 2383](https://rust-lang.github.io/rfcs/2383-lint-reasons.html))

This lint only warns outer attributes (`#[allow]`), as inner attributes
(`#![allow]`) are usually used to enable or disable lints on a global scale."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::allow_attributes_without_reason",
        description: r##"Checks for attributes that allow lints without a reason."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::almost_complete_range",
        description: r##"Checks for ranges which almost include the entire range of letters from 'a' to 'z'
or digits from '0' to '9', but don't because they're a half open range."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::almost_swapped",
        description: r##"Checks for `foo = bar; bar = foo` sequences."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::approx_constant",
        description: r##"Checks for floating point literals that approximate
constants which are defined in
[`std::f32::consts`](https://doc.rust-lang.org/stable/std/f32/consts/#constants)
or
[`std::f64::consts`](https://doc.rust-lang.org/stable/std/f64/consts/#constants),
respectively, suggesting to use the predefined constant."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::arc_with_non_send_sync",
        description: r##".
This lint warns when you use `Arc` with a type that does not implement `Send` or `Sync`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::arithmetic_side_effects",
        description: r##"Checks any kind of arithmetic operation of any type.

Operators like `+`, `-`, `*` or `<<` are usually capable of overflowing according to the [Rust
Reference](https://doc.rust-lang.org/reference/expressions/operator-expr.html#overflow),
or can panic (`/`, `%`).

Known safe built-in types like `Wrapping` or `Saturating`, floats, operations in constant
environments, allowed types and non-constant operations that won't overflow are ignored."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::as_conversions",
        description: r##"Checks for usage of `as` conversions.

Note that this lint is specialized in linting *every single* use of `as`
regardless of whether good alternatives exist or not.
If you want more precise lints for `as`, please consider using these separate lints:
`unnecessary_cast`, `cast_lossless/cast_possible_truncation/cast_possible_wrap/cast_precision_loss/cast_sign_loss`,
`fn_to_numeric_cast(_with_truncation)`, `char_lit_as_u8`, `ref_to_mut` and `ptr_as_ptr`.
There is a good explanation the reason why this lint should work in this way and how it is useful
[in this issue](https://github.com/rust-lang/rust-clippy/issues/5122)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::as_ptr_cast_mut",
        description: r##"Checks for the result of a `&self`-taking `as_ptr` being cast to a mutable pointer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::as_underscore",
        description: r##"Checks for the usage of `as _` conversion using inferred type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::assertions_on_constants",
        description: r##"Checks for `assert!(true)` and `assert!(false)` calls."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::assertions_on_result_states",
        description: r##"Checks for `assert!(r.is_ok())` or `assert!(r.is_err())` calls."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::assign_op_pattern",
        description: r##"Checks for `a = a op b` or `a = b commutative_op a`
patterns."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::assign_ops",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::assigning_clones",
        description: r##"Checks for code like `foo = bar.clone();`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::async_yields_async",
        description: r##"Checks for async blocks that yield values of types
that can themselves be awaited."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::await_holding_invalid_type",
        description: r##"Allows users to configure types which should not be held across await
suspension points."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::await_holding_lock",
        description: r##"Checks for calls to `await` while holding a non-async-aware
`MutexGuard`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::await_holding_refcell_ref",
        description: r##"Checks for calls to `await` while holding a `RefCell`, `Ref`, or `RefMut`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bad_bit_mask",
        description: r##"Checks for incompatible bit masks in comparisons.

The formula for detecting if an expression of the type `_ <bit_op> m
<cmp_op> c` (where `<bit_op>` is one of {`&`, `|`} and `<cmp_op>` is one of
{`!=`, `>=`, `>`, `!=`, `>=`, `>`}) can be determined from the following
table:

|Comparison  |Bit Op|Example      |is always|Formula               |
|------------|------|-------------|---------|----------------------|
|`==` or `!=`| `&`  |`x & 2 == 3` |`false`  |`c & m != c`          |
|`<`  or `>=`| `&`  |`x & 2 < 3`  |`true`   |`m < c`               |
|`>`  or `<=`| `&`  |`x & 1 > 1`  |`false`  |`m <= c`              |
|`==` or `!=`| `\\|` |`x \\| 1 == 0`|`false`  |`c \\| m != c`         |
|`<`  or `>=`| `\\|` |`x \\| 1 < 1` |`false`  |`m >= c`              |
|`<=` or `>` | `\\|` |`x \\| 1 > 0` |`true`   |`m > c`               |"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::big_endian_bytes",
        description: r##"Checks for the usage of the `to_be_bytes` method and/or the function `from_be_bytes`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bind_instead_of_map",
        description: r##"Checks for usage of `_.and_then(|x| Some(y))`, `_.and_then(|x| Ok(y))`
or `_.or_else(|x| Err(y))`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::blanket_clippy_restriction_lints",
        description: r##"Checks for `warn`/`deny`/`forbid` attributes targeting the whole clippy::restriction category."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::blocks_in_conditions",
        description: r##"Checks for `if` and `match` conditions that use blocks containing an
expression, statements or conditions that use closures with blocks."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bool_assert_comparison",
        description: r##"This lint warns about boolean comparisons in assert-like macros."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bool_comparison",
        description: r##"Checks for expressions of the form `x == true`,
`x != true` and order comparisons such as `x < true` (or vice versa) and
suggest using the variable directly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bool_to_int_with_if",
        description: r##"Instead of using an if statement to convert a bool to an int,
this lint suggests using a `from()` function or an `as` coercion."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::borrow_as_ptr",
        description: r##"Checks for the usage of `&expr as *const T` or
`&mut expr as *mut T`, and suggest using `ptr::addr_of` or
`ptr::addr_of_mut` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::borrow_deref_ref",
        description: r##"Checks for `&*(&T)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::borrow_interior_mutable_const",
        description: r##"Checks if `const` items which is interior mutable (e.g.,
contains a `Cell`, `Mutex`, `AtomicXxxx`, etc.) has been borrowed directly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::borrowed_box",
        description: r##"Checks for usage of `&Box<T>` anywhere in the code.
Check the [Box documentation](https://doc.rust-lang.org/std/boxed/index.html) for more information."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::box_collection",
        description: r##"Checks for usage of `Box<T>` where T is a collection such as Vec anywhere in the code.
Check the [Box documentation](https://doc.rust-lang.org/std/boxed/index.html) for more information."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::box_default",
        description: r##"checks for `Box::new(Default::default())`, which can be written as
`Box::default()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::boxed_local",
        description: r##"Checks for usage of `Box<T>` where an unboxed `T` would
work fine."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::branches_sharing_code",
        description: r##"Checks if the `if` and `else` block contain shared code that can be
moved out of the blocks."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::builtin_type_shadow",
        description: r##"Warns if a generic shadows a built-in type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::byte_char_slices",
        description: r##"Checks for hard to read slices of byte characters, that could be more easily expressed as a
byte string."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bytes_count_to_len",
        description: r##"It checks for `str::bytes().count()` and suggests replacing it with
`str::len()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::bytes_nth",
        description: r##"Checks for the use of `.bytes().nth()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cargo_common_metadata",
        description: r##"Checks to see if all common metadata is defined in
`Cargo.toml`. See: https://rust-lang-nursery.github.io/api-guidelines/documentation.html#cargotoml-includes-all-common-metadata-c-metadata"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::case_sensitive_file_extension_comparisons",
        description: r##"Checks for calls to `ends_with` with possible file extensions
and suggests to use a case-insensitive approach instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_abs_to_unsigned",
        description: r##"Checks for usage of the `abs()` method that cast the result to unsigned."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_enum_constructor",
        description: r##"Checks for casts from an enum tuple constructor to an integer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_enum_truncation",
        description: r##"Checks for casts from an enum type to an integral type that will definitely truncate the
value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_lossless",
        description: r##"Checks for casts between numeric types that can be replaced by safe
conversion functions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_nan_to_int",
        description: r##"Checks for a known NaN float being cast to an integer"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_possible_truncation",
        description: r##"Checks for casts between numeric types that may
truncate large values. This is expected behavior, so the cast is `Allow` by
default. It suggests user either explicitly ignore the lint,
or use `try_from()` and handle the truncation, default, or panic explicitly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_possible_wrap",
        description: r##"Checks for casts from an unsigned type to a signed type of
the same size, or possibly smaller due to target-dependent integers.
Performing such a cast is a no-op for the compiler (that is, nothing is
changed at the bit level), and the binary representation of the value is
reinterpreted. This can cause wrapping if the value is too big
for the target signed type. However, the cast works as defined, so this lint
is `Allow` by default."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_precision_loss",
        description: r##"Checks for casts from any numeric type to a float type where
the receiving type cannot store all values from the original type without
rounding errors. This possible rounding is to be expected, so this lint is
`Allow` by default.

Basically, this warns on casting any integer with 32 or more bits to `f32`
or any 64-bit integer to `f64`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_ptr_alignment",
        description: r##"Checks for casts, using `as` or `pointer::cast`, from a
less strictly aligned pointer to a more strictly aligned pointer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_sign_loss",
        description: r##"Checks for casts from a signed to an unsigned numeric
type. In this case, negative values wrap around to large positive values,
which can be quite surprising in practice. However, since the cast works as
defined, this lint is `Allow` by default."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_slice_different_sizes",
        description: r##"Checks for `as` casts between raw pointers to slices with differently sized elements."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cast_slice_from_raw_parts",
        description: r##"Checks for a raw slice being cast to a slice pointer"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cfg_not_test",
        description: r##"Checks for usage of `cfg` that excludes code from `test` builds. (i.e., `#[cfg(not(test))]`)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::char_lit_as_u8",
        description: r##"Checks for expressions where a character literal is cast
to `u8` and suggests using a byte literal instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::chars_last_cmp",
        description: r##"Checks for usage of `_.chars().last()` or
`_.chars().next_back()` on a `str` to check if it ends with a given char."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::chars_next_cmp",
        description: r##"Checks for usage of `.chars().next()` on a `str` to check
if it starts with a given char."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::checked_conversions",
        description: r##"Checks for explicit bounds checking when casting."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::clear_with_drain",
        description: r##"Checks for usage of `.drain(..)` for the sole purpose of clearing a container."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::clone_on_copy",
        description: r##"Checks for usage of `.clone()` on a `Copy` type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::clone_on_ref_ptr",
        description: r##"Checks for usage of `.clone()` on a ref-counted pointer,
(`Rc`, `Arc`, `rc::Weak`, or `sync::Weak`), and suggests calling Clone via unified
function syntax instead (e.g., `Rc::clone(foo)`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cloned_instead_of_copied",
        description: r##"Checks for usage of `cloned()` on an `Iterator` or `Option` where
`copied()` could be used instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cmp_null",
        description: r##"This lint checks for equality comparisons with `ptr::null`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cmp_owned",
        description: r##"Checks for conversions to owned values just for the sake
of a comparison."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::cognitive_complexity",
        description: r##"Checks for methods with high cognitive complexity."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::collapsible_else_if",
        description: r##"Checks for collapsible `else { if ... }` expressions
that can be collapsed to `else if ...`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::collapsible_if",
        description: r##"Checks for nested `if` statements which can be collapsed
by `&&`-combining their conditions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::collapsible_match",
        description: r##"Finds nested `match` or `if let` expressions where the patterns may be collapsed together
without adding any branches.

Note that this lint is not intended to find _all_ cases where nested match patterns can be merged, but only
cases where merging would most likely make the code more readable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::collapsible_str_replace",
        description: r##"Checks for consecutive calls to `str::replace` (2 or more)
that can be collapsed into a single call."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::collection_is_never_read",
        description: r##"Checks for collections that are never queried."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::comparison_chain",
        description: r##"Checks comparison chains written with `if` that can be
rewritten with `match` and `cmp`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::comparison_to_empty",
        description: r##"Checks for comparing to an empty slice such as `` or `[]`,
and suggests using `.is_empty()` where applicable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::const_is_empty",
        description: r##"It identifies calls to `.is_empty()` on constant values."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::copy_iterator",
        description: r##"Checks for types that implement `Copy` as well as
`Iterator`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::crate_in_macro_def",
        description: r##"Checks for usage of `crate` as opposed to `$crate` in a macro definition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::create_dir",
        description: r##"Checks usage of `std::fs::create_dir` and suggest using `std::fs::create_dir_all` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::crosspointer_transmute",
        description: r##"Checks for transmutes between a type `T` and `*T`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::dbg_macro",
        description: r##"Checks for usage of the [`dbg!`](https://doc.rust-lang.org/std/macro.dbg.html) macro."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::debug_assert_with_mut_call",
        description: r##"Checks for function/method calls with a mutable
parameter in `debug_assert!`, `debug_assert_eq!` and `debug_assert_ne!` macros."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::decimal_literal_representation",
        description: r##"Warns if there is a better representation for a numeric literal."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::declare_interior_mutable_const",
        description: r##"Checks for declaration of `const` items which is interior
mutable (e.g., contains a `Cell`, `Mutex`, `AtomicXxxx`, etc.)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::default_constructed_unit_structs",
        description: r##"Checks for construction on unit struct using `default`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::default_instead_of_iter_empty",
        description: r##"It checks for `std::iter::Empty::default()` and suggests replacing it with
`std::iter::empty()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::default_numeric_fallback",
        description: r##"Checks for usage of unconstrained numeric literals which may cause default numeric fallback in type
inference.

Default numeric fallback means that if numeric types have not yet been bound to concrete
types at the end of type inference, then integer type is bound to `i32`, and similarly
floating type is bound to `f64`.

See [RFC0212](https://github.com/rust-lang/rfcs/blob/master/text/0212-restore-int-fallback.md) for more information about the fallback."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::default_trait_access",
        description: r##"Checks for literal calls to `Default::default()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::default_union_representation",
        description: r##"Displays a warning when a union is declared with the default representation (without a `#[repr(C)]` attribute)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::deprecated_cfg_attr",
        description: r##"Checks for `#[cfg_attr(rustfmt, rustfmt_skip)]` and suggests to replace it
with `#[rustfmt::skip]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::deprecated_clippy_cfg_attr",
        description: r##"Checks for `#[cfg_attr(feature = cargo-clippy, ...)]` and for
`#[cfg(feature = cargo-clippy)]` and suggests to replace it with
`#[cfg_attr(clippy, ...)]` or `#[cfg(clippy)]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::deprecated_semver",
        description: r##"Checks for `#[deprecated]` annotations with a `since`
field that is not a valid semantic version. Also allows TBD to signal
future deprecation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::deref_addrof",
        description: r##"Checks for usage of `*&` and `*&mut` in expressions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::deref_by_slicing",
        description: r##"Checks for slicing expressions which are equivalent to dereferencing the
value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::derivable_impls",
        description: r##"Detects manual `std::default::Default` implementations that are identical to a derived implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::derive_ord_xor_partial_ord",
        description: r##"Lints against manual `PartialOrd` and `Ord` implementations for types with a derived `Ord`
or `PartialOrd` implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::derive_partial_eq_without_eq",
        description: r##"Checks for types that derive `PartialEq` and could implement `Eq`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::derived_hash_with_manual_eq",
        description: r##"Lints against manual `PartialEq` implementations for types with a derived `Hash`
implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::disallowed_macros",
        description: r##"Denies the configured macros in clippy.toml

Note: Even though this lint is warn-by-default, it will only trigger if
macros are defined in the clippy.toml file."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::disallowed_methods",
        description: r##"Denies the configured methods and functions in clippy.toml

Note: Even though this lint is warn-by-default, it will only trigger if
methods are defined in the clippy.toml file."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::disallowed_names",
        description: r##"Checks for usage of disallowed names for variables, such
as `foo`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::disallowed_script_idents",
        description: r##"Checks for usage of unicode scripts other than those explicitly allowed
by the lint config.

This lint doesn't take into account non-text scripts such as `Unknown` and `Linear_A`.
It also ignores the `Common` script type.
While configuring, be sure to use official script name [aliases] from
[the list of supported scripts][supported_scripts].

See also: [`non_ascii_idents`].

[aliases]: http://www.unicode.org/reports/tr24/tr24-31.html#Script_Value_Aliases
[supported_scripts]: https://www.unicode.org/iso15924/iso15924-codes.html"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::disallowed_types",
        description: r##"Denies the configured types in clippy.toml.

Note: Even though this lint is warn-by-default, it will only trigger if
types are defined in the clippy.toml file."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::diverging_sub_expression",
        description: r##"Checks for diverging calls that are not match arms or
statements."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::doc_lazy_continuation",
        description: r##"In CommonMark Markdown, the language used to write doc comments, a
paragraph nested within a list or block quote does not need any line
after the first one to be indented or marked. The specification calls
this a lazy paragraph continuation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::doc_link_with_quotes",
        description: r##"Detects the syntax `['foo']` in documentation comments (notice quotes instead of backticks)
outside of code blocks"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::doc_markdown",
        description: r##"Checks for the presence of `_`, `::` or camel-case words
outside ticks in documentation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::double_comparisons",
        description: r##"Checks for double comparisons that could be simplified to a single expression."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::double_must_use",
        description: r##"Checks for a `#[must_use]` attribute without
further information on functions and methods that return a type already
marked as `#[must_use]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::double_neg",
        description: r##"Detects expressions of the form `--x`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::double_parens",
        description: r##"Checks for unnecessary double parentheses."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::drain_collect",
        description: r##"Checks for calls to `.drain()` that clear the collection, immediately followed by a call to `.collect()`.

> Collection in this context refers to any type with a `drain` method:
> `Vec`, `VecDeque`, `BinaryHeap`, `HashSet`,`HashMap`, `String`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::drop_non_drop",
        description: r##"Checks for calls to `std::mem::drop` with a value that does not implement `Drop`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::duplicate_mod",
        description: r##"Checks for files that are included as modules multiple times."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::duplicate_underscore_argument",
        description: r##"Checks for function arguments having the similar names
differing by an underscore."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::duplicated_attributes",
        description: r##"Checks for attributes that appear two or more times."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::duration_subsec",
        description: r##"Checks for calculation of subsecond microseconds or milliseconds
from other `Duration` methods."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::eager_transmute",
        description: r##"Checks for integer validity checks, followed by a transmute that is (incorrectly) evaluated
eagerly (e.g. using `bool::then_some`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::else_if_without_else",
        description: r##"Checks for usage of if expressions with an `else if` branch,
but without a final `else` branch."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_docs",
        description: r##"Detects documentation that is empty."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_drop",
        description: r##"Checks for empty `Drop` implementations."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_enum",
        description: r##"Checks for `enum`s with no variants, which therefore are uninhabited types
(cannot be instantiated).

As of this writing, the `never_type` is still a nightly-only experimental API.
Therefore, this lint is only triggered if `#![feature(never_type)]` is enabled."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_enum_variants_with_brackets",
        description: r##"Finds enum variants without fields that are declared with empty brackets."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_line_after_doc_comments",
        description: r##"Checks for empty lines after doc comments."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_line_after_outer_attr",
        description: r##"Checks for empty lines after outer attributes"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_loop",
        description: r##"Checks for empty `loop` expressions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::empty_structs_with_brackets",
        description: r##"Finds structs without fields (a so-called empty struct) that are declared with brackets."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::enum_clike_unportable_variant",
        description: r##"Checks for C-like enumerations that are
`repr(isize/usize)` and have values that don't fit into an `i32`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::enum_glob_use",
        description: r##"Checks for `use Enum::*`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::enum_variant_names",
        description: r##"Detects enumeration variants that are prefixed or suffixed
by the same characters."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::eq_op",
        description: r##"Checks for equal operands to comparison, logical and
bitwise, difference and division binary operators (`==`, `>`, etc., `&&`,
`||`, `&`, `|`, `^`, `-` and `/`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::equatable_if_let",
        description: r##"Checks for pattern matchings that can be expressed using equality."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::erasing_op",
        description: r##"Checks for erasing operations, e.g., `x * 0`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::err_expect",
        description: r##"Checks for `.err().expect()` calls on the `Result` type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::error_impl_error",
        description: r##"Checks for types named `Error` that implement `Error`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::excessive_nesting",
        description: r##"Checks for blocks which are nested beyond a certain threshold.

Note: Even though this lint is warn-by-default, it will only trigger if a maximum nesting level is defined in the clippy.toml file."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::excessive_precision",
        description: r##"Checks for float literals with a precision greater
than that supported by the underlying type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::exhaustive_enums",
        description: r##"Warns on any exported `enum`s that are not tagged `#[non_exhaustive]`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::exhaustive_structs",
        description: r##"Warns on any exported `struct`s that are not tagged `#[non_exhaustive]`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::exit",
        description: r##"Detects calls to the `exit()` function which terminates the program."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::expect_fun_call",
        description: r##"Checks for calls to `.expect(&format!(...))`, `.expect(foo(..))`,
etc., and suggests to use `unwrap_or_else` instead"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::expect_used",
        description: r##"Checks for `.expect()` or `.expect_err()` calls on `Result`s and `.expect()` call on `Option`s."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::expl_impl_clone_on_copy",
        description: r##"Checks for explicit `Clone` implementations for `Copy`
types."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_auto_deref",
        description: r##"Checks for dereferencing expressions which would be covered by auto-deref."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_counter_loop",
        description: r##"Checks `for` loops over slices with an explicit counter
and suggests the use of `.enumerate()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_deref_methods",
        description: r##"Checks for explicit `deref()` or `deref_mut()` method calls."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_into_iter_loop",
        description: r##"Checks for loops on `y.into_iter()` where `y` will do, and
suggests the latter."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_iter_loop",
        description: r##"Checks for loops on `x.iter()` where `&x` will do, and
suggests the latter."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::explicit_write",
        description: r##"Checks for usage of `write!()` / `writeln()!` which can be
replaced with `(e)print!()` / `(e)println!()`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::extend_from_slice",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::extend_with_drain",
        description: r##"Checks for occurrences where one vector gets extended instead of append"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::extra_unused_lifetimes",
        description: r##"Checks for lifetimes in generics that are never used
anywhere else."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::extra_unused_type_parameters",
        description: r##"Checks for type parameters in generics that are never used anywhere else."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fallible_impl_from",
        description: r##"Checks for impls of `From<..>` that contain `panic!()` or `unwrap()`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::field_reassign_with_default",
        description: r##"Checks for immediate reassignment of fields initialized
with Default::default()."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::field_scoped_visibility_modifiers",
        description: r##"Checks for usage of scoped visibility modifiers, like `pub(crate)`, on fields. These
make a field visible within a scope between public and private."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::filetype_is_file",
        description: r##"Checks for `FileType::is_file()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::filter_map_bool_then",
        description: r##"Checks for usage of `bool::then` in `Iterator::filter_map`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::filter_map_identity",
        description: r##"Checks for usage of `filter_map(|x| x)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::filter_map_next",
        description: r##"Checks for usage of `_.filter_map(_).next()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::filter_next",
        description: r##"Checks for usage of `_.filter(_).next()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::flat_map_identity",
        description: r##"Checks for usage of `flat_map(|x| x)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::flat_map_option",
        description: r##"Checks for usage of `Iterator::flat_map()` where `filter_map()` could be
used instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::float_arithmetic",
        description: r##"Checks for float arithmetic."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::float_cmp",
        description: r##"Checks for (in-)equality comparisons on floating-point
values (apart from zero), except in functions called `*eq*` (which probably
implement equality for a type involving floats)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::float_cmp_const",
        description: r##"Checks for (in-)equality comparisons on constant floating-point
values (apart from zero), except in functions called `*eq*` (which probably
implement equality for a type involving floats)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::float_equality_without_abs",
        description: r##"Checks for statements of the form `(a - b) < f32::EPSILON` or
`(a - b) < f64::EPSILON`. Notes the missing `.abs()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fn_address_comparisons",
        description: r##"Checks for comparisons with an address of a function item."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fn_params_excessive_bools",
        description: r##"Checks for excessive use of
bools in function definitions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fn_to_numeric_cast",
        description: r##"Checks for casts of function pointers to something other than `usize`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fn_to_numeric_cast_any",
        description: r##"Checks for casts of a function pointer to any integer type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::fn_to_numeric_cast_with_truncation",
        description: r##"Checks for casts of a function pointer to a numeric type not wide enough to
store an address."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::for_kv_map",
        description: r##"Checks for iterating a map (`HashMap` or `BTreeMap`) and
ignoring either the keys or values."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::forget_non_drop",
        description: r##"Checks for calls to `std::mem::forget` with a value that does not implement `Drop`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::format_collect",
        description: r##"Checks for usage of `.map(|_| format!(..)).collect::<String>()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::format_in_format_args",
        description: r##"Detects `format!` within the arguments of another macro that does
formatting such as `format!` itself, `write!` or `println!`. Suggests
inlining the `format!` call."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::format_push_string",
        description: r##"Detects cases where the result of a `format!` call is
appended to an existing `String`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::four_forward_slashes",
        description: r##"Checks for outer doc comments written with 4 forward slashes (`////`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::from_iter_instead_of_collect",
        description: r##"Checks for `from_iter()` function calls on types that implement the `FromIterator`
trait."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::from_over_into",
        description: r##"Searches for implementations of the `Into<..>` trait and suggests to implement `From<..>` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::from_raw_with_void_ptr",
        description: r##"Checks if we're passing a `c_void` raw pointer to `{Box,Rc,Arc,Weak}::from_raw(_)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::from_str_radix_10",
        description: r##"Checks for function invocations of the form `primitive::from_str_radix(s, 10)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::future_not_send",
        description: r##"This lint requires Future implementations returned from
functions and methods to implement the `Send` marker trait. It is mostly
used by library authors (public and internal) that target an audience where
multithreaded executors are likely to be used for running these Futures."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::get_first",
        description: r##"Checks for usage of `x.get(0)` instead of
`x.first()` or `x.front()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::get_last_with_len",
        description: r##"Checks for usage of `x.get(x.len() - 1)` instead of
`x.last()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::get_unwrap",
        description: r##"Checks for usage of `.get().unwrap()` (or
`.get_mut().unwrap`) on a standard library type which implements `Index`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::host_endian_bytes",
        description: r##"Checks for the usage of the `to_ne_bytes` method and/or the function `from_ne_bytes`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::identity_op",
        description: r##"Checks for identity operations, e.g., `x + 0`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::if_let_mutex",
        description: r##"Checks for `Mutex::lock` calls in `if let` expression
with lock calls in any of the else blocks."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::if_not_else",
        description: r##"Checks for usage of `!` or `!=` in an if condition with an
else branch."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::if_same_then_else",
        description: r##"Checks for `if/else` with the same body as the *then* part
and the *else* part."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::if_then_some_else_none",
        description: r##"Checks for if-else that could be written using either `bool::then` or `bool::then_some`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ifs_same_cond",
        description: r##"Checks for consecutive `if`s with the same condition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ignored_unit_patterns",
        description: r##"Checks for usage of `_` in patterns of type `()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::impl_hash_borrow_with_str_and_bytes",
        description: r##"This lint is concerned with the semantics of `Borrow` and `Hash` for a
type that implements all three of `Hash`, `Borrow<str>` and `Borrow<[u8]>`
as it is impossible to satisfy the semantics of Borrow and `Hash` for
both `Borrow<str>` and `Borrow<[u8]>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::impl_trait_in_params",
        description: r##"Lints when `impl Trait` is being used in a function's parameters."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implicit_clone",
        description: r##"Checks for the usage of `_.to_owned()`, `vec.to_vec()`, or similar when calling `_.clone()` would be clearer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implicit_hasher",
        description: r##"Checks for public `impl` or `fn` missing generalization
over different hashers and implicitly defaulting to the default hashing
algorithm (`SipHash`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implicit_return",
        description: r##"Checks for missing return statements at the end of a block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implicit_saturating_add",
        description: r##"Checks for implicit saturating addition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implicit_saturating_sub",
        description: r##"Checks for implicit saturating subtraction."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::implied_bounds_in_impls",
        description: r##"Looks for bounds in `impl Trait` in return position that are implied by other bounds.
This can happen when a trait is specified that another trait already has as a supertrait
(e.g. `fn() -> impl Deref + DerefMut<Target = i32>` has an unnecessary `Deref` bound,
because `Deref` is a supertrait of `DerefMut`)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::impossible_comparisons",
        description: r##"Checks for double comparisons that can never succeed"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::imprecise_flops",
        description: r##"Looks for floating-point expressions that
can be expressed using built-in methods to improve accuracy
at the cost of performance."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::incompatible_msrv",
        description: r##"This lint checks that no function newer than the defined MSRV (minimum
supported rust version) is used in the crate."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inconsistent_digit_grouping",
        description: r##"Warns if an integral or floating-point constant is
grouped inconsistently with underscores."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inconsistent_struct_constructor",
        description: r##"Checks for struct constructors where all fields are shorthand and
the order of the field init shorthand in the constructor is inconsistent
with the order in the struct definition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::index_refutable_slice",
        description: r##"The lint checks for slice bindings in patterns that are only used to
access individual slice values."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::indexing_slicing",
        description: r##"Checks for usage of indexing or slicing. Arrays are special cases, this lint
does report on arrays if we can tell that slicing operations are in bounds and does not
lint on constant `usize` indexing on arrays because that is handled by rustc's `const_err` lint."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ineffective_bit_mask",
        description: r##"Checks for bit masks in comparisons which can be removed
without changing the outcome. The basic structure can be seen in the
following table:

|Comparison| Bit Op   |Example     |equals |
|----------|----------|------------|-------|
|`>` / `<=`|`\\|` / `^`|`x \\| 2 > 3`|`x > 3`|
|`<` / `>=`|`\\|` / `^`|`x ^ 1 < 4` |`x < 4`|"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ineffective_open_options",
        description: r##"Checks if both `.write(true)` and `.append(true)` methods are called
on a same `OpenOptions`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inefficient_to_string",
        description: r##"Checks for usage of `.to_string()` on an `&&T` where
`T` implements `ToString` directly (like `&&str` or `&&String`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::infallible_destructuring_match",
        description: r##"Checks for matches being used to destructure a single-variant enum
or tuple struct where a `let` will suffice."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::infinite_iter",
        description: r##"Checks for iteration that is guaranteed to be infinite."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::infinite_loop",
        description: r##"Checks for infinite loops in a function where the return type is not `!`
and lint accordingly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inherent_to_string",
        description: r##"Checks for the definition of inherent methods with a signature of `to_string(&self) -> String`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inherent_to_string_shadow_display",
        description: r##"Checks for the definition of inherent methods with a signature of `to_string(&self) -> String` and if the type implementing this method also implements the `Display` trait."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::init_numbered_fields",
        description: r##"Checks for tuple structs initialized with field syntax.
It will however not lint if a base initializer is present.
The lint will also ignore code in macros."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inline_always",
        description: r##"Checks for items annotated with `#[inline(always)]`,
unless the annotated function is empty or simply panics."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inline_asm_x86_att_syntax",
        description: r##"Checks for usage of AT&T x86 assembly syntax."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inline_asm_x86_intel_syntax",
        description: r##"Checks for usage of Intel x86 assembly syntax."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inline_fn_without_body",
        description: r##"Checks for `#[inline]` on trait methods without bodies"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inspect_for_each",
        description: r##"Checks for usage of `inspect().for_each()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::int_plus_one",
        description: r##"Checks for usage of `x >= y + 1` or `x - 1 >= y` (and `<=`) in a block"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::integer_division",
        description: r##"Checks for division of integers"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::integer_division_remainder_used",
        description: r##"Checks for the usage of division (`/`) and remainder (`%`) operations
when performed on any integer types using the default `Div` and `Rem` trait implementations."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::into_iter_on_ref",
        description: r##"Checks for `into_iter` calls on references which should be replaced by `iter`
or `iter_mut`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::into_iter_without_iter",
        description: r##"This is the opposite of the `iter_without_into_iter` lint.
It looks for `IntoIterator for (&|&mut) Type` implementations without an inherent `iter` or `iter_mut` method
on the type or on any of the types in its `Deref` chain."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::invalid_null_ptr_usage",
        description: r##"This lint checks for invalid usages of `ptr::null`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::invalid_regex",
        description: r##"Checks [regex](https://crates.io/crates/regex) creation
(with `Regex::new`, `RegexBuilder::new`, or `RegexSet::new`) for correct
regex syntax."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::invalid_upcast_comparisons",
        description: r##"Checks for comparisons where the relation is always either
true or false, but where one side has been upcast so that the comparison is
necessary. Only integer types are checked."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::inverted_saturating_sub",
        description: r##"Checks for comparisons between integers, followed by subtracting the greater value from the
lower one."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::invisible_characters",
        description: r##"Checks for invisible Unicode characters in the code."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::is_digit_ascii_radix",
        description: r##"Finds usages of [`char::is_digit`](https://doc.rust-lang.org/stable/std/primitive.char.html#method.is_digit) that
can be replaced with [`is_ascii_digit`](https://doc.rust-lang.org/stable/std/primitive.char.html#method.is_ascii_digit) or
[`is_ascii_hexdigit`](https://doc.rust-lang.org/stable/std/primitive.char.html#method.is_ascii_hexdigit)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::items_after_statements",
        description: r##"Checks for items declared after some statement in a block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::items_after_test_module",
        description: r##"Triggers if an item is declared after the testing module marked with `#[cfg(test)]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_cloned_collect",
        description: r##"Checks for the use of `.cloned().collect()` on slice to
create a `Vec`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_count",
        description: r##"Checks for the use of `.iter().count()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_filter_is_ok",
        description: r##"Checks for usage of `.filter(Result::is_ok)` that may be replaced with a `.flatten()` call.
This lint will require additional changes to the follow-up calls as it affects the type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_filter_is_some",
        description: r##"Checks for usage of `.filter(Option::is_some)` that may be replaced with a `.flatten()` call.
This lint will require additional changes to the follow-up calls as it affects the type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_kv_map",
        description: r##"Checks for iterating a map (`HashMap` or `BTreeMap`) and
ignoring either the keys or values."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_next_loop",
        description: r##"Checks for loops on `x.next()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_next_slice",
        description: r##"Checks for usage of `iter().next()` on a Slice or an Array"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_not_returning_iterator",
        description: r##"Detects methods named `iter` or `iter_mut` that do not have a return type that implements `Iterator`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_nth",
        description: r##"Checks for usage of `.iter().nth()`/`.iter_mut().nth()` on standard library types that have
equivalent `.get()`/`.get_mut()` methods."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_nth_zero",
        description: r##"Checks for the use of `iter.nth(0)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_on_empty_collections",
        description: r##"Checks for calls to `iter`, `iter_mut` or `into_iter` on empty collections"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_on_single_items",
        description: r##"Checks for calls to `iter`, `iter_mut` or `into_iter` on collections containing a single item"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_out_of_bounds",
        description: r##"Looks for iterator combinator calls such as `.take(x)` or `.skip(x)`
where `x` is greater than the amount of items that an iterator will produce."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_over_hash_type",
        description: r##"This is a restriction lint which prevents the use of hash types (i.e., `HashSet` and `HashMap`) in for loops."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_overeager_cloned",
        description: r##"Checks for usage of `_.cloned().<func>()` where call to `.cloned()` can be postponed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_skip_next",
        description: r##"Checks for usage of `.skip(x).next()` on iterators."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_skip_zero",
        description: r##"Checks for usage of `.skip(0)` on iterators."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_with_drain",
        description: r##"Checks for usage of `.drain(..)` on `Vec` and `VecDeque` for iteration."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iter_without_into_iter",
        description: r##"Looks for `iter` and `iter_mut` methods without an associated `IntoIterator for (&|&mut) Type` implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::iterator_step_by_zero",
        description: r##"Checks for calling `.step_by(0)` on iterators which panics."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::join_absolute_paths",
        description: r##"Checks for calls to `Path::join` that start with a path separator (`\\\\` or `/`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::just_underscores_and_digits",
        description: r##"Checks if you have variables whose name consists of just
underscores and digits."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_const_arrays",
        description: r##"Checks for large `const` arrays that should
be defined as `static` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_digit_groups",
        description: r##"Warns if the digits of an integral or floating-point
constant are grouped into groups that
are too large."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_enum_variant",
        description: r##"Checks for large size differences between variants on
`enum`s."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_futures",
        description: r##"It checks for the size of a `Future` created by `async fn` or `async {}`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_include_file",
        description: r##"Checks for the inclusion of large files via `include_bytes!()`
or `include_str!()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_stack_arrays",
        description: r##"Checks for local arrays that may be too large."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_stack_frames",
        description: r##"Checks for functions that use a lot of stack space.

This often happens when constructing a large type, such as an array with a lot of elements,
or constructing *many* smaller-but-still-large structs, or copying around a lot of large types.

This lint is a more general version of [`large_stack_arrays`](https://rust-lang.github.io/rust-clippy/master/#large_stack_arrays)
that is intended to look at functions as a whole instead of only individual array expressions inside of a function."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::large_types_passed_by_value",
        description: r##"Checks for functions taking arguments by value, where
the argument type is `Copy` and large enough to be worth considering
passing by reference. Does not trigger if the function is being exported,
because that might induce API breakage, if the parameter is declared as mutable,
or if the argument is a `self`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::legacy_numeric_constants",
        description: r##"Checks for usage of `<integer>::max_value()`, `std::<integer>::MAX`,
`std::<float>::EPSILON`, etc."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::len_without_is_empty",
        description: r##"Checks for items that implement `.len()` but not
`.is_empty()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::len_zero",
        description: r##"Checks for getting the length of something via `.len()`
just to compare to zero, and suggests using `.is_empty()` where applicable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_and_return",
        description: r##"Checks for `let`-bindings, which are subsequently
returned."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_underscore_future",
        description: r##"Checks for `let _ = <expr>` where the resulting type of expr implements `Future`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_underscore_lock",
        description: r##"Checks for `let _ = sync_lock`. This supports `mutex` and `rwlock` in
`parking_lot`. For `std` locks see the `rustc` lint
[`let_underscore_lock`](https://doc.rust-lang.org/nightly/rustc/lints/listing/deny-by-default.html#let-underscore-lock)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_underscore_must_use",
        description: r##"Checks for `let _ = <expr>` where expr is `#[must_use]`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_underscore_untyped",
        description: r##"Checks for `let _ = <expr>` without a type annotation, and suggests to either provide one,
or remove the `let` keyword altogether."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_unit_value",
        description: r##"Checks for binding a unit value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::let_with_type_underscore",
        description: r##"Detects when a variable is declared with an explicit type of `_`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::lines_filter_map_ok",
        description: r##"Checks for usage of `lines.filter_map(Result::ok)` or `lines.flat_map(Result::ok)`
when `lines` has type `std::io::Lines`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::linkedlist",
        description: r##"Checks for usage of any `LinkedList`, suggesting to use a
`Vec` or a `VecDeque` (formerly called `RingBuf`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::lint_groups_priority",
        description: r##"Checks for lint groups with the same priority as lints in the `Cargo.toml`
[`[lints]` table](https://doc.rust-lang.org/cargo/reference/manifest.html#the-lints-section).

This lint will be removed once [cargo#12918](https://github.com/rust-lang/cargo/issues/12918)
is resolved."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::little_endian_bytes",
        description: r##"Checks for the usage of the `to_le_bytes` method and/or the function `from_le_bytes`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::lossy_float_literal",
        description: r##"Checks for whole number float literals that
cannot be represented as the underlying type without loss."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::macro_metavars_in_unsafe",
        description: r##"Looks for macros that expand metavariables in an unsafe block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::macro_use_imports",
        description: r##"Checks for `#[macro_use] use...`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::main_recursion",
        description: r##"Checks for recursion using the entrypoint."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_assert",
        description: r##"Detects `if`-then-`panic!` that can be replaced with `assert!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_async_fn",
        description: r##"It checks for manual implementations of `async` functions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_bits",
        description: r##"Checks for usage of `size_of::<T>() * 8` when
`T::BITS` is available."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_c_str_literals",
        description: r##"Checks for the manual creation of C strings (a string with a `NUL` byte at the end), either
through one of the `CStr` constructor functions, or more plainly by calling `.as_ptr()`
on a (byte) string literal with a hardcoded `\\0` byte at the end."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_clamp",
        description: r##"Identifies good opportunities for a clamp function from std or core, and suggests using it."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_div_ceil",
        description: r##"Checks for an expression like `(x + (y - 1)) / y` which is a common manual reimplementation
of `x.div_ceil(y)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_filter",
        description: r##"Checks for usage of `match` which could be implemented using `filter`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_filter_map",
        description: r##"Checks for usage of `_.filter(_).map(_)` that can be written more simply
as `filter_map(_)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_find",
        description: r##"Checks for manual implementations of Iterator::find"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_find_map",
        description: r##"Checks for usage of `_.find(_).map(_)` that can be written more simply
as `find_map(_)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_flatten",
        description: r##"Checks for unnecessary `if let` usage in a for loop
where only the `Some` or `Ok` variant of the iterator element is used."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_hash_one",
        description: r##"Checks for cases where [`BuildHasher::hash_one`] can be used.

[`BuildHasher::hash_one`]: https://doc.rust-lang.org/std/hash/trait.BuildHasher.html#method.hash_one"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_inspect",
        description: r##"Checks for uses of `map` which return the original item."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_instant_elapsed",
        description: r##"Lints subtraction between `Instant::now()` and another `Instant`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_is_ascii_check",
        description: r##"Suggests to use dedicated built-in methods,
`is_ascii_(lowercase|uppercase|digit|hexdigit)` for checking on corresponding
ascii range"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_is_finite",
        description: r##"Checks for manual `is_finite` reimplementations
(i.e., `x != <float>::INFINITY && x != <float>::NEG_INFINITY`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_is_infinite",
        description: r##"Checks for manual `is_infinite` reimplementations
(i.e., `x == <float>::INFINITY || x == <float>::NEG_INFINITY`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_is_power_of_two",
        description: r##"Checks for expressions like `x.count_ones() == 1` or `x & (x - 1) == 0`, with x and unsigned integer, which are manual
reimplementations of `x.is_power_of_two()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_is_variant_and",
        description: r##"Checks for usage of `option.map(f).unwrap_or_default()` and `result.map(f).unwrap_or_default()` where f is a function or closure that returns the `bool` type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_let_else",
        description: r##"Warn of cases where `let...else` could be used"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_main_separator_str",
        description: r##"Checks for references on `std::path::MAIN_SEPARATOR.to_string()` used
to build a `&str`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_map",
        description: r##"Checks for usage of `match` which could be implemented using `map`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_memcpy",
        description: r##"Checks for for-loops that manually copy items between
slices that could be optimized by having a memcpy."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_next_back",
        description: r##"Checks for `.rev().next()` on a `DoubleEndedIterator`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_non_exhaustive",
        description: r##"Checks for manual implementations of the non-exhaustive pattern."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_ok_or",
        description: r##"Finds patterns that reimplement `Option::ok_or`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_pattern_char_comparison",
        description: r##"Checks for manual `char` comparison in string patterns"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_range_contains",
        description: r##"Checks for expressions like `x >= 3 && x < 8` that could
be more readably expressed as `(3..8).contains(x)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_range_patterns",
        description: r##"Looks for combined OR patterns that are all contained in a specific range,
e.g. `6 | 4 | 5 | 9 | 7 | 8` can be rewritten as `4..=9`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_rem_euclid",
        description: r##"Checks for an expression like `((x % 4) + 4) % 4` which is a common manual reimplementation
of `x.rem_euclid(4)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_retain",
        description: r##"Checks for code to be replaced by `.retain()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_rotate",
        description: r##"It detects manual bit rotations that could be rewritten using standard
functions `rotate_left` or `rotate_right`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_saturating_arithmetic",
        description: r##"Checks for `.checked_add/sub(x).unwrap_or(MAX/MIN)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_slice_size_calculation",
        description: r##"When `a` is `&[T]`, detect `a.len() * size_of::<T>()` and suggest `size_of_val(a)`
instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_split_once",
        description: r##"Checks for usage of `str::splitn(2, _)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_str_repeat",
        description: r##"Checks for manual implementations of `str::repeat`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_string_new",
        description: r##"Checks for usage of `` to create a `String`, such as `.to_string()`, `.to_owned()`,
`String::from()` and others."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_strip",
        description: r##"Suggests using `strip_{prefix,suffix}` over `str::{starts,ends}_with` and slicing using
the pattern's length."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_swap",
        description: r##"Checks for manual swapping.

Note that the lint will not be emitted in const blocks, as the suggestion would not be applicable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_try_fold",
        description: r##"Checks for usage of `Iterator::fold` with a type that implements `Try`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_unwrap_or",
        description: r##"Finds patterns that reimplement `Option::unwrap_or` or `Result::unwrap_or`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_unwrap_or_default",
        description: r##"Checks if a `match` or `if let` expression can be simplified using
`.unwrap_or_default()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::manual_while_let_some",
        description: r##"Looks for loops that check for emptiness of a `Vec` in the condition and pop an element
in the body as a separate operation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::many_single_char_names",
        description: r##"Checks for too many variables whose name consists of a
single character."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_clone",
        description: r##"Checks for usage of `map(|x| x.clone())` or
dereferencing closures for `Copy` types, on `Iterator` or `Option`,
and suggests `cloned()` or `copied()` instead"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_collect_result_unit",
        description: r##"Checks for usage of `_.map(_).collect::<Result<(), _>()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_entry",
        description: r##"Checks for usage of `contains_key` + `insert` on `HashMap`
or `BTreeMap`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_err_ignore",
        description: r##"Checks for instances of `map_err(|_| Some::Enum)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_flatten",
        description: r##"Checks for usage of `_.map(_).flatten(_)` on `Iterator` and `Option`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_identity",
        description: r##"Checks for instances of `map(f)` where `f` is the identity function."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::map_unwrap_or",
        description: r##"Checks for usage of `option.map(_).unwrap_or(_)` or `option.map(_).unwrap_or_else(_)` or
`result.map(_).unwrap_or_else(_)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_as_ref",
        description: r##"Checks for match which is used to add a reference to an
`Option` value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_bool",
        description: r##"Checks for matches where match expression is a `bool`. It
suggests to replace the expression with an `if...else` block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_like_matches_macro",
        description: r##"Checks for `match`  or `if let` expressions producing a
`bool` that could be written using `matches!`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_on_vec_items",
        description: r##"Checks for `match vec[idx]` or `match vec[n..m]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_overlapping_arm",
        description: r##"Checks for overlapping match arms."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_ref_pats",
        description: r##"Checks for matches where all arms match a reference,
suggesting to remove the reference and deref the matched expression
instead. It also checks for `if let &foo = bar` blocks."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_result_ok",
        description: r##"Checks for unnecessary `ok()` in `while let`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_same_arms",
        description: r##"Checks for `match` with identical arm bodies.

Note: Does not lint on wildcards if the `non_exhaustive_omitted_patterns_lint` feature is
enabled and disallowed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_single_binding",
        description: r##"Checks for useless match that binds to only one value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_str_case_mismatch",
        description: r##"Checks for `match` expressions modifying the case of a string with non-compliant arms"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_wild_err_arm",
        description: r##"Checks for arm which matches all errors with `Err(_)`
and take drastic actions like `panic!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::match_wildcard_for_single_variants",
        description: r##"Checks for wildcard enum matches for a single variant."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::maybe_infinite_iter",
        description: r##"Checks for iteration that may be infinite."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mem_forget",
        description: r##"Checks for usage of `std::mem::forget(t)` where `t` is
`Drop` or has a field that implements `Drop`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mem_replace_option_with_none",
        description: r##"Checks for `mem::replace()` on an `Option` with
`None`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mem_replace_with_default",
        description: r##"Checks for `std::mem::replace` on a value of type
`T` with `T::default()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mem_replace_with_uninit",
        description: r##"Checks for `mem::replace(&mut _, mem::uninitialized())`
and `mem::replace(&mut _, mem::zeroed())`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::min_ident_chars",
        description: r##"Checks for identifiers which consist of a single character (or fewer than the configured threshold).

Note: This lint can be very noisy when enabled; it may be desirable to only enable it
temporarily."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::min_max",
        description: r##"Checks for expressions where `std::cmp::min` and `max` are
used to clamp values, but switched so that the result is constant."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::misaligned_transmute",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mismatching_type_param_order",
        description: r##"Checks for type parameters which are positioned inconsistently between
a type definition and impl block. Specifically, a parameter in an impl
block which has the same name as a parameter in the type def, but is in
a different place."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::misnamed_getters",
        description: r##"Checks for getter methods that return a field that doesn't correspond
to the name of the method, when there is a field's whose name matches that of the method."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::misrefactored_assign_op",
        description: r##"Checks for `a op= a op b` or `a op= b op a` patterns."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_assert_message",
        description: r##"Checks assertions without a custom panic message."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_asserts_for_indexing",
        description: r##"Checks for repeated slice indexing without asserting beforehand that the length
is greater than the largest index used to index into the slice."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_const_for_fn",
        description: r##"Suggests the use of `const` in functions and methods where possible."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_const_for_thread_local",
        description: r##"Suggests to use `const` in `thread_local!` macro if possible."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_docs_in_private_items",
        description: r##"Warns if there is missing documentation for any private documentable item."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_enforced_import_renames",
        description: r##"Checks for imports that do not rename the item as specified
in the `enforced-import-renames` config option.

Note: Even though this lint is warn-by-default, it will only trigger if
import renames are defined in the `clippy.toml` file."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_errors_doc",
        description: r##"Checks the doc comments of publicly visible functions that
return a `Result` type and warns if there is no `# Errors` section."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_fields_in_debug",
        description: r##"Checks for manual [`core::fmt::Debug`](https://doc.rust-lang.org/core/fmt/trait.Debug.html) implementations that do not use all fields."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_inline_in_public_items",
        description: r##"It lints if an exported function, method, trait method with default impl,
or trait method impl is not `#[inline]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_panics_doc",
        description: r##"Checks the doc comments of publicly visible functions that
may panic and warns if there is no `# Panics` section."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_safety_doc",
        description: r##"Checks for the doc comments of publicly visible
unsafe functions and warns if there is no `# Safety` section."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_spin_loop",
        description: r##"Checks for empty spin loops"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_trait_methods",
        description: r##"Checks if a provided method is used implicitly by a trait
implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::missing_transmute_annotations",
        description: r##"Checks if transmute calls have all generics specified."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mistyped_literal_suffixes",
        description: r##"Warns for mistyped suffix in literals"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mixed_attributes_style",
        description: r##"Checks for items that have the same kind of attributes with mixed styles (inner/outer)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mixed_case_hex_literals",
        description: r##"Warns on hexadecimal literals with mixed-case letter
digits."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mixed_read_write_in_expression",
        description: r##"Checks for a read and a write to the same variable where
whether the read occurs before or after the write depends on the evaluation
order of sub-expressions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mod_module_files",
        description: r##"Checks that module layout uses only self named module files; bans `mod.rs` files."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::module_inception",
        description: r##"Checks for modules that have the same name as their
parent module"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::module_name_repetitions",
        description: r##"Detects type names that are prefixed or suffixed by the
containing module's name."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::modulo_arithmetic",
        description: r##"Checks for modulo arithmetic."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::modulo_one",
        description: r##"Checks for getting the remainder of integer division by one or minus
one."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::multi_assignments",
        description: r##"Checks for nested assignments."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::multiple_bound_locations",
        description: r##"Check if a generic is defined both in the bound predicate and in the `where` clause."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::multiple_crate_versions",
        description: r##"Checks to see if multiple versions of a crate are being
used."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::multiple_inherent_impl",
        description: r##"Checks for multiple inherent implementations of a struct"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::multiple_unsafe_ops_per_block",
        description: r##"Checks for `unsafe` blocks that contain more than one unsafe operation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::must_use_candidate",
        description: r##"Checks for public functions that have no
`#[must_use]` attribute, but return something not already marked
must-use, have no mutable arg and mutate no statics."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::must_use_unit",
        description: r##"Checks for a `#[must_use]` attribute on
unit-returning functions and methods."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mut_from_ref",
        description: r##"This lint checks for functions that take immutable references and return
mutable ones. This will not trigger if no unsafe code exists as there
are multiple safe functions which will do this transformation

To be on the conservative side, if there's at least one mutable
reference with the output lifetime, this lint will not trigger."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mut_mut",
        description: r##"Checks for instances of `mut mut` references."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mut_mutex_lock",
        description: r##"Checks for `&mut Mutex::lock` calls"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mut_range_bound",
        description: r##"Checks for loops with a range bound that is a mutable variable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mutable_key_type",
        description: r##"Checks for sets/maps with mutable key types."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mutex_atomic",
        description: r##"Checks for usage of `Mutex<X>` where an atomic will do."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::mutex_integer",
        description: r##"Checks for usage of `Mutex<X>` where `X` is an integral
type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::naive_bytecount",
        description: r##"Checks for naive byte counts"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_arbitrary_self_type",
        description: r##"The lint checks for `self` in fn parameters that
specify the `Self`-type explicitly"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_bitwise_bool",
        description: r##"Checks for usage of bitwise and/or operators between booleans, where performance may be improved by using
a lazy and."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_bool",
        description: r##"Checks for expressions of the form `if c { true } else {
false }` (or vice versa) and suggests using the condition directly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_bool_assign",
        description: r##"Checks for expressions of the form `if c { x = true } else { x = false }`
(or vice versa) and suggest assigning the variable directly from the
condition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_borrow",
        description: r##"Checks for address of operations (`&`) that are going to
be dereferenced immediately by the compiler."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_borrowed_reference",
        description: r##"Checks for bindings that needlessly destructure a reference and borrow the inner
value with `&ref`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_borrows_for_generic_args",
        description: r##"Checks for borrow operations (`&`) that are used as a generic argument to a
function when the borrowed value could be used."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_character_iteration",
        description: r##"Checks if an iterator is used to check if a string is ascii."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_collect",
        description: r##"Checks for functions collecting an iterator when collect
is not needed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_continue",
        description: r##"The lint checks for `if`-statements appearing in loops
that contain a `continue` statement in either their main blocks or their
`else`-blocks, when omitting the `else`-block possibly with some
rearrangement of code can make the code easier to understand."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_doctest_main",
        description: r##"Checks for `fn main() { .. }` in doctests"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_else",
        description: r##"Checks for empty `else` branches."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_for_each",
        description: r##"Checks for usage of `for_each` that would be more simply written as a
`for` loop."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_if",
        description: r##"Checks for empty `if` branches with no else branch."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_late_init",
        description: r##"Checks for late initializations that can be replaced by a `let` statement
with an initializer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_lifetimes",
        description: r##"Checks for lifetime annotations which can be removed by
relying on lifetime elision."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_match",
        description: r##"Checks for unnecessary `match` or match-like `if let` returns for `Option` and `Result`
when function signatures are the same."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_maybe_sized",
        description: r##"Lints `?Sized` bounds applied to type parameters that cannot be unsized"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_option_as_deref",
        description: r##"Checks for no-op uses of `Option::{as_deref, as_deref_mut}`,
for example, `Option<&T>::as_deref()` returns the same type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_option_take",
        description: r##"Checks for calling `take` function after `as_ref`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_parens_on_range_literals",
        description: r##"The lint checks for parenthesis on literals in range statements that are
superfluous."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_pass_by_ref_mut",
        description: r##"Check if a `&mut` function argument is actually used mutably.

Be careful if the function is publicly reexported as it would break compatibility with
users of this function, when the users pass this function as an argument."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_pass_by_value",
        description: r##"Checks for functions taking arguments by value, but not
consuming them in its
body."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_pub_self",
        description: r##"Checks for usage of `pub(self)` and `pub(in self)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_question_mark",
        description: r##"Suggests alternatives for useless applications of `?` in terminating expressions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_range_loop",
        description: r##"Checks for looping over the range of `0..len` of some
collection just to get the values by index."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_raw_string_hashes",
        description: r##"Checks for raw string literals with an unnecessary amount of hashes around them."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_raw_strings",
        description: r##"Checks for raw string literals where a string literal can be used instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_return",
        description: r##"Checks for return statements at the end of a block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_return_with_question_mark",
        description: r##"Checks for return statements on `Err` paired with the `?` operator."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_splitn",
        description: r##"Checks for usage of `str::splitn` (or `str::rsplitn`) where using `str::split` would be the same."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::needless_update",
        description: r##"Checks for needlessly including a base struct on update
when all fields are changed anyway.

This lint is not applied to structs marked with
[non_exhaustive](https://doc.rust-lang.org/reference/attributes/type_system.html)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::neg_cmp_op_on_partial_ord",
        description: r##"Checks for the usage of negated comparison operators on types which only implement
`PartialOrd` (e.g., `f64`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::neg_multiply",
        description: r##"Checks for multiplication by -1 as a form of negation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::negative_feature_names",
        description: r##"Checks for negative feature names with prefix `no-` or `not-`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::never_loop",
        description: r##"Checks for loops that will always `break`, `return` or
`continue` an outer loop."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::new_ret_no_self",
        description: r##"Checks for `new` not returning a type that contains `Self`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::new_without_default",
        description: r##"Checks for public types with a `pub fn new() -> Self` method and no
implementation of
[`Default`](https://doc.rust-lang.org/std/default/trait.Default.html)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::no_effect",
        description: r##"Checks for statements which have no effect."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::no_effect_replace",
        description: r##"Checks for `replace` statements which have no effect."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::no_effect_underscore_binding",
        description: r##"Checks for binding to underscore prefixed variable without side-effects."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::no_mangle_with_rust_abi",
        description: r##"Checks for Rust ABI functions with the `#[no_mangle]` attribute."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_ascii_literal",
        description: r##"Checks for non-ASCII characters in string and char literals."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_canonical_clone_impl",
        description: r##"Checks for non-canonical implementations of `Clone` when `Copy` is already implemented."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_canonical_partial_ord_impl",
        description: r##"Checks for non-canonical implementations of `PartialOrd` when `Ord` is already implemented."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_minimal_cfg",
        description: r##"Checks for `any` and `all` combinators in `cfg` with only one condition."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_octal_unix_permissions",
        description: r##"Checks for non-octal values used to set Unix file permissions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_send_fields_in_send_ty",
        description: r##"This lint warns about a `Send` implementation for a type that
contains fields that are not safe to be sent across threads.
It tries to detect fields that can cause a soundness issue
when sent to another thread (e.g., `Rc`) while allowing `!Send` fields
that are expected to exist in a `Send` type, such as raw pointers."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::non_zero_suggestions",
        description: r##"Checks for conversions from `NonZero` types to regular integer types,
and suggests using `NonZero` types for the target as well."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::nonminimal_bool",
        description: r##"Checks for boolean expressions that can be written more
concisely."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::nonsensical_open_options",
        description: r##"Checks for duplicate open options as well as combinations
that make no sense."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::nonstandard_macro_braces",
        description: r##"Checks that common macros are used with consistent bracing."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::not_unsafe_ptr_arg_deref",
        description: r##"Checks for public functions that dereference raw pointer
arguments but are not marked `unsafe`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::obfuscated_if_else",
        description: r##"Checks for usage of `.then_some(..).unwrap_or(..)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::octal_escapes",
        description: r##"Checks for `\\0` escapes in string and byte literals that look like octal
character escapes in C."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ok_expect",
        description: r##"Checks for usage of `ok().expect(..)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::only_used_in_recursion",
        description: r##"Checks for arguments that are only used in recursion with no side-effects."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::op_ref",
        description: r##"Checks for arguments to `==` which have their address
taken to satisfy a bound
and suggests to dereference the other argument instead"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_as_ref_cloned",
        description: r##"Checks for usage of `.as_ref().cloned()` and `.as_mut().cloned()` on `Option`s"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_as_ref_deref",
        description: r##"Checks for usage of `_.as_ref().map(Deref::deref)` or its aliases (such as String::as_str)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_env_unwrap",
        description: r##"Checks for usage of `option_env!(...).unwrap()` and
suggests usage of the `env!` macro."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_filter_map",
        description: r##"Checks for iterators of `Option`s using `.filter(Option::is_some).map(Option::unwrap)` that may
be replaced with a `.flatten()` call."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_if_let_else",
        description: r##"Lints usage of `if let Some(v) = ... { y } else { x }` and
`match .. { Some(v) => y, None/_ => x }` which are more
idiomatically done with `Option::map_or` (if the else bit is a pure
expression) or `Option::map_or_else` (if the else bit is an impure
expression)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_map_or_err_ok",
        description: r##"Checks for usage of `_.map_or(Err(_), Ok)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_map_or_none",
        description: r##"Checks for usage of `_.map_or(None, _)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_map_unit_fn",
        description: r##"Checks for usage of `option.map(f)` where f is a function
or closure that returns the unit type `()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::option_option",
        description: r##"Checks for usage of `Option<Option<_>>` in function signatures and type
definitions"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::or_fun_call",
        description: r##"Checks for calls to `.or(foo(..))`, `.unwrap_or(foo(..))`,
`.or_insert(foo(..))` etc., and suggests to use `.or_else(|| foo(..))`,
`.unwrap_or_else(|| foo(..))`, `.unwrap_or_default()` or `.or_default()`
etc. instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::or_then_unwrap",
        description: r##"Checks for `.or(…).unwrap()` calls to Options and Results."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::out_of_bounds_indexing",
        description: r##"Checks for out of bounds array indexing with a constant
index."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::overly_complex_bool_expr",
        description: r##"Checks for boolean expressions that contain terminals that
can be eliminated."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::panic",
        description: r##"Checks for usage of `panic!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::panic_in_result_fn",
        description: r##"Checks for usage of `panic!` or assertions in a function whose return type is `Result`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::panicking_overflow_checks",
        description: r##"Detects C-style underflow/overflow checks."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::panicking_unwrap",
        description: r##"Checks for calls of `unwrap[_err]()` that will always fail."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::partial_pub_fields",
        description: r##"Checks whether some but not all fields of a `struct` are public.

Either make all fields of a type public, or make none of them public"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::partialeq_ne_impl",
        description: r##"Checks for manual re-implementations of `PartialEq::ne`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::partialeq_to_none",
        description: r##"Checks for binary comparisons to a literal `Option::None`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::path_buf_push_overwrite",
        description: r##"* Checks for [push](https://doc.rust-lang.org/std/path/struct.PathBuf.html#method.push)
calls on `PathBuf` that can cause overwrites."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::path_ends_with_ext",
        description: r##"Looks for calls to `Path::ends_with` calls where the argument looks like a file extension.

By default, Clippy has a short list of known filenames that start with a dot
but aren't necessarily file extensions (e.g. the `.git` folder), which are allowed by default.
The `allowed-dotfiles` configuration can be used to allow additional
file extensions that Clippy should not lint."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pathbuf_init_then_push",
        description: r##"Checks for calls to `push` immediately after creating a new `PathBuf`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pattern_type_mismatch",
        description: r##"Checks for patterns that aren't exact representations of the types
they are applied to.

To satisfy this lint, you will have to adjust either the expression that is matched
against or the pattern itself, as well as the bindings that are introduced by the
adjusted patterns. For matching you will have to either dereference the expression
with the `*` operator, or amend the patterns to explicitly match against `&<pattern>`
or `&mut <pattern>` depending on the reference mutability. For the bindings you need
to use the inverse. You can leave them as plain bindings if you wish for the value
to be copied, but you must use `ref mut <variable>` or `ref <variable>` to construct
a reference into the matched structure.

If you are looking for a way to learn about ownership semantics in more detail, it
is recommended to look at IDE options available to you to highlight types, lifetimes
and reference semantics in your code. The available tooling would expose these things
in a general way even outside of the various pattern matching mechanics. Of course
this lint can still be used to highlight areas of interest and ensure a good understanding
of ownership semantics."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::permissions_set_readonly_false",
        description: r##"Checks for calls to `std::fs::Permissions.set_readonly` with argument `false`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pointers_in_nomem_asm_block",
        description: r##"Checks if any pointer is being passed to an asm! block with `nomem` option."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::possible_missing_comma",
        description: r##"Checks for possible missing comma in an array. It lints if
an array element is a binary operator expression and it lies on two lines."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::precedence",
        description: r##"Checks for operations where precedence may be unclear
and suggests to add parentheses. Currently it catches the following:
* mixed usage of arithmetic and bit shifting/combining operators without
parentheses"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::print_in_format_impl",
        description: r##"Checks for usage of `println`, `print`, `eprintln` or `eprint` in an
implementation of a formatting trait."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::print_literal",
        description: r##"This lint warns about the use of literals as `print!`/`println!` args."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::print_stderr",
        description: r##"Checks for printing on *stderr*. The purpose of this lint
is to catch debugging remnants."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::print_stdout",
        description: r##"Checks for printing on *stdout*. The purpose of this lint
is to catch debugging remnants."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::print_with_newline",
        description: r##"This lint warns when you use `print!()` with a format
string that ends in a newline."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::println_empty_string",
        description: r##"This lint warns when you use `println!()` to
print a newline."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ptr_arg",
        description: r##"This lint checks for function arguments of type `&String`, `&Vec`,
`&PathBuf`, and `Cow<_>`. It will also suggest you replace `.clone()` calls
with the appropriate `.to_owned()`/`to_string()` calls."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ptr_as_ptr",
        description: r##"Checks for `as` casts between raw pointers that don't change their
constness, namely `*const T` to `*const U` and `*mut T` to `*mut U`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ptr_cast_constness",
        description: r##"Checks for `as` casts between raw pointers that change their constness, namely `*const T` to
`*mut T` and `*mut T` to `*const T`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ptr_eq",
        description: r##"Use `std::ptr::eq` when applicable"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ptr_offset_with_cast",
        description: r##"Checks for usage of the `offset` pointer method with a `usize` casted to an
`isize`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pub_enum_variant_names",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pub_underscore_fields",
        description: r##"Checks whether any field of the struct is prefixed with an `_` (underscore) and also marked
`pub` (public)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pub_use",
        description: r##"Restricts the usage of `pub use ...`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pub_with_shorthand",
        description: r##"Checks for usage of `pub(<loc>)` with `in`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::pub_without_shorthand",
        description: r##"Checks for usage of `pub(<loc>)` without `in`.

Note: As you cannot write a module's path in `pub(<loc>)`, this will only trigger on
`pub(super)` and the like."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::question_mark",
        description: r##"Checks for expressions that could be replaced by the question mark operator."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::question_mark_used",
        description: r##"Checks for expressions that use the question mark operator and rejects them."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::range_minus_one",
        description: r##"Checks for inclusive ranges where 1 is subtracted from
the upper bound, e.g., `x..=(y-1)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::range_plus_one",
        description: r##"Checks for exclusive ranges where 1 is added to the
upper bound, e.g., `x..(y+1)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::range_step_by_zero",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::range_zip_with_len",
        description: r##"Checks for zipping a collection with the range of
`0.._.len()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::rc_buffer",
        description: r##"Checks for `Rc<T>` and `Arc<T>` when `T` is a mutable buffer type such as `String` or `Vec`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::rc_clone_in_vec_init",
        description: r##"Checks for reference-counted pointers (`Arc`, `Rc`, `rc::Weak`, and `sync::Weak`)
in `vec![elem; len]`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::rc_mutex",
        description: r##"Checks for `Rc<Mutex<T>>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::read_line_without_trim",
        description: r##"Looks for calls to [`Stdin::read_line`] to read a line from the standard input
into a string, then later attempting to use that string for an operation that will never
work for strings with a trailing newline character in it (e.g. parsing into a `i32`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::read_zero_byte_vec",
        description: r##"This lint catches reads into a zero-length `Vec`.
Especially in the case of a call to `with_capacity`, this lint warns that read
gets the number of bytes from the `Vec`'s length, not its capacity."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::readonly_write_lock",
        description: r##"Looks for calls to `RwLock::write` where the lock is only used for reading."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::recursive_format_impl",
        description: r##"Checks for format trait implementations (e.g. `Display`) with a recursive call to itself
which uses `self` as a parameter.
This is typically done indirectly with the `write!` macro or with `to_string()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_allocation",
        description: r##"Checks for usage of redundant allocations anywhere in the code."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_as_str",
        description: r##"Checks for usage of `as_str()` on a `String` chained with a method available on the `String` itself."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_async_block",
        description: r##"Checks for `async` block that only returns `await` on a future."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_at_rest_pattern",
        description: r##"Checks for `[all @ ..]` patterns."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_clone",
        description: r##"Checks for a redundant `clone()` (and its relatives) which clones an owned
value that is going to be dropped without further use."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_closure",
        description: r##"Checks for closures which just call another function where
the function can be called directly. `unsafe` functions, calls where types
get adjusted or where the callee is marked `#[track_caller]` are ignored."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_closure_call",
        description: r##"Detects closures called in the same expression where they
are defined."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_closure_for_method_calls",
        description: r##"Checks for closures which only invoke a method on the closure
argument and can be replaced by referencing the method directly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_comparisons",
        description: r##"Checks for ineffective double comparisons against constants."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_else",
        description: r##"Checks for `else` blocks that can be removed without changing semantics."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_feature_names",
        description: r##"Checks for feature names with prefix `use-`, `with-` or suffix `-support`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_field_names",
        description: r##"Checks for fields in struct literals where shorthands
could be used."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_guards",
        description: r##"Checks for unnecessary guards in match expressions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_locals",
        description: r##"Checks for redundant redefinitions of local bindings."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_pattern",
        description: r##"Checks for patterns in the form `name @ _`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_pattern_matching",
        description: r##"Lint for redundant pattern matching over `Result`, `Option`,
`std::task::Poll`, `std::net::IpAddr` or `bool`s"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_pub_crate",
        description: r##"Checks for items declared `pub(crate)` that are not crate visible because they
are inside a private module."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_slicing",
        description: r##"Checks for redundant slicing expressions which use the full range, and
do not change the type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_static_lifetimes",
        description: r##"Checks for constants and statics with an explicit `'static` lifetime."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::redundant_type_annotations",
        description: r##"Warns about needless / redundant type annotations."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ref_as_ptr",
        description: r##"Checks for casts of references to pointer using `as`
and suggests `std::ptr::from_ref` and `std::ptr::from_mut` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ref_binding_to_reference",
        description: r##"Checks for `ref` bindings which create a reference to a reference."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ref_option",
        description: r##"Warns when a function signature uses `&Option<T>` instead of `Option<&T>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ref_option_ref",
        description: r##"Checks for usage of `&Option<&T>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::ref_patterns",
        description: r##"Checks for usages of the `ref` keyword."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::regex_macro",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::renamed_function_params",
        description: r##"Lints when the name of function parameters from trait impl is
different than its default implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::repeat_once",
        description: r##"Checks for usage of `.repeat(1)` and suggest the following method for each types.
- `.to_string()` for `str`
- `.clone()` for `String`
- `.to_vec()` for `slice`

The lint will evaluate constant expressions and values as arguments of `.repeat(..)` and emit a message if
they are equivalent to `1`. (Related discussion in [rust-clippy#7306](https://github.com/rust-lang/rust-clippy/issues/7306))"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::repeat_vec_with_capacity",
        description: r##"Looks for patterns such as `vec![Vec::with_capacity(x); n]` or `iter::repeat(Vec::with_capacity(x))`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::replace_consts",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::reserve_after_initialization",
        description: r##"Informs the user about a more concise way to create a vector with a known capacity."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::rest_pat_in_fully_bound_structs",
        description: r##"Checks for unnecessary '..' pattern binding on struct when all fields are explicitly matched."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::result_filter_map",
        description: r##"Checks for iterators of `Result`s using `.filter(Result::is_ok).map(Result::unwrap)` that may
be replaced with a `.flatten()` call."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::result_large_err",
        description: r##"Checks for functions that return `Result` with an unusually large
`Err`-variant."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::result_map_or_into_option",
        description: r##"Checks for usage of `_.map_or(None, Some)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::result_map_unit_fn",
        description: r##"Checks for usage of `result.map(f)` where f is a function
or closure that returns the unit type `()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::result_unit_err",
        description: r##"Checks for public functions that return a `Result`
with an `Err` type of `()`. It suggests using a custom type that
implements `std::error::Error`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::return_self_not_must_use",
        description: r##"This lint warns when a method returning `Self` doesn't have the `#[must_use]` attribute."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::reversed_empty_ranges",
        description: r##"Checks for range expressions `x..y` where both `x` and `y`
are constant and `x` is greater to `y`. Also triggers if `x` is equal to `y` when they are conditions to a `for` loop."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::same_functions_in_if_condition",
        description: r##"Checks for consecutive `if`s with the same function call."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::same_item_push",
        description: r##"Checks whether a for loop is being used to push a constant
value into a Vec."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::same_name_method",
        description: r##"It lints if a struct has two methods with the same name:
one from a trait, another not from a trait."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::search_is_some",
        description: r##"Checks for an iterator or string search (such as `find()`,
`position()`, or `rposition()`) followed by a call to `is_some()` or `is_none()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::seek_from_current",
        description: r##"Checks if the `seek` method of the `Seek` trait is called with `SeekFrom::Current(0)`,
and if it is, suggests using `stream_position` instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::seek_to_start_instead_of_rewind",
        description: r##"Checks for jumps to the start of a stream that implements `Seek`
and uses the `seek` method providing `Start` as parameter."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::self_assignment",
        description: r##"Checks for explicit self-assignments."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::self_named_constructors",
        description: r##"Warns when constructors have the same name as their types."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::self_named_module_files",
        description: r##"Checks that module layout uses only `mod.rs` files."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::semicolon_if_nothing_returned",
        description: r##"Looks for blocks of expressions and fires if the last expression returns
`()` but is not followed by a semicolon."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::semicolon_inside_block",
        description: r##"Suggests moving the semicolon after a block to the inside of the block, after its last
expression."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::semicolon_outside_block",
        description: r##"Suggests moving the semicolon from a block's final expression outside of the block."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::separated_literal_suffix",
        description: r##"Warns if literal suffixes are separated by an underscore.
To enforce separated literal suffix style,
see the `unseparated_literal_suffix` lint."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::serde_api_misuse",
        description: r##"Checks for misuses of the serde API."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::set_contains_or_insert",
        description: r##"Checks for usage of `contains` to see if a value is not present
in a set like `HashSet` or `BTreeSet`, followed by an `insert`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::shadow_reuse",
        description: r##"Checks for bindings that shadow other bindings already in
scope, while reusing the original value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::shadow_same",
        description: r##"Checks for bindings that shadow other bindings already in
scope, while just changing reference level or mutability."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::shadow_unrelated",
        description: r##"Checks for bindings that shadow other bindings already in
scope, either without an initialization or with one that does not even use
the original value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::short_circuit_statement",
        description: r##"Checks for the use of short circuit boolean conditions as
a
statement."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::should_assert_eq",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::should_implement_trait",
        description: r##"Checks for methods that should live in a trait
implementation of a `std` trait (see [llogiq's blog
post](http://llogiq.github.io/2015/07/30/traits.html) for further
information) instead of an inherent implementation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::should_panic_without_expect",
        description: r##"Checks for `#[should_panic]` attributes without specifying the expected panic message."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::significant_drop_in_scrutinee",
        description: r##"Checks for temporaries returned from function calls in a match scrutinee that have the
`clippy::has_significant_drop` attribute."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::significant_drop_tightening",
        description: r##"Searches for elements marked with `#[clippy::has_significant_drop]` that could be early
dropped but are in fact dropped at the end of their scopes. In other words, enforces the
tightening of their possible lifetimes."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::similar_names",
        description: r##"Checks for names that are very similar and thus confusing.

Note: this lint looks for similar names throughout each
scope. To allow it, you need to allow it on the scope
level, not on the name that is reported."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_call_fn",
        description: r##"Checks for functions that are only used once. Does not lint tests."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_char_add_str",
        description: r##"Warns when using `push_str`/`insert_str` with a single-character string literal
where `push`/`insert` with a `char` would work fine."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_char_lifetime_names",
        description: r##"Checks for lifetimes with names which are one character
long."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_char_pattern",
        description: r##"Checks for string methods that receive a single-character
`str` as an argument, e.g., `_.split(x)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_component_path_imports",
        description: r##"Checking for imports with single component use path."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_element_loop",
        description: r##"Checks whether a for loop has a single element."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_match",
        description: r##"Checks for matches with a single arm where an `if let`
will usually suffice.

This intentionally does not lint if there are comments
inside of the other arm, so as to allow the user to document
why having another explicit pattern with an empty body is necessary,
or because the comments need to be preserved for other reasons."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_match_else",
        description: r##"Checks for matches with two arms where an `if let else` will
usually suffice."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::single_range_in_vec_init",
        description: r##"Checks for `Vec` or array initializations that contain only one range."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::size_of_in_element_count",
        description: r##"Detects expressions where
`size_of::<T>` or `size_of_val::<T>` is used as a
count of elements of type `T`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::size_of_ref",
        description: r##"Checks for calls to `size_of_val()` where the argument is
a reference to a reference."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::skip_while_next",
        description: r##"Checks for usage of `_.skip_while(condition).next()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::slow_vector_initialization",
        description: r##"Checks slow zero-filled vector initialization"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::stable_sort_primitive",
        description: r##"When sorting primitive values (integers, bools, chars, as well
as arrays, slices, and tuples of such items), it is typically better to
use an unstable sort than a stable sort."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::std_instead_of_alloc",
        description: r##"Finds items imported through `std` when available through `alloc`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::std_instead_of_core",
        description: r##"Finds items imported through `std` when available through `core`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::str_split_at_newline",
        description: r##"Checks for usages of `str.trim().split(\
)` and `str.trim().split(\\
)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::str_to_string",
        description: r##"This lint checks for `.to_string()` method calls on values of type `&str`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_add",
        description: r##"Checks for all instances of `x + _` where `x` is of type
`String`, but only if [`string_add_assign`](#string_add_assign) does *not*
match."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_add_assign",
        description: r##"Checks for string appends of the form `x = x + y` (without
`let`!)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_extend_chars",
        description: r##"Checks for the use of `.extend(s.chars())` where s is a
`&str` or `String`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_from_utf8_as_bytes",
        description: r##"Check if the string is transformed to byte array and casted back to string."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_lit_as_bytes",
        description: r##"Checks for the `as_bytes` method called on string literals
that contain only ASCII characters."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_lit_chars_any",
        description: r##"Checks for `<string_lit>.chars().any(|i| i == c)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_slice",
        description: r##"Checks for slice operations on strings"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::string_to_string",
        description: r##"This lint checks for `.to_string()` method calls on values of type `String`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::strlen_on_c_strings",
        description: r##"Checks for usage of `libc::strlen` on a `CString` or `CStr` value,
and suggest calling `as_bytes().len()` or `to_bytes().len()` respectively instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::struct_excessive_bools",
        description: r##"Checks for excessive
use of bools in structs."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::struct_field_names",
        description: r##"Detects struct fields that are prefixed or suffixed
by the same characters or the name of the struct itself."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suboptimal_flops",
        description: r##"Looks for floating-point expressions that
can be expressed using built-in methods to improve both
accuracy and performance."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_arithmetic_impl",
        description: r##"Lints for suspicious operations in impls of arithmetic operators, e.g.
subtracting elements in an Add impl."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_assignment_formatting",
        description: r##"Checks for usage of the non-existent `=*`, `=!` and `=-`
operators."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_command_arg_space",
        description: r##"Checks for `Command::arg()` invocations that look like they
should be multiple arguments instead, such as `arg(-t ext2)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_doc_comments",
        description: r##"Detects the use of outer doc comments (`///`, `/**`) followed by a bang (`!`): `///!`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_else_formatting",
        description: r##"Checks for formatting of `else`. It lints if the `else`
is followed immediately by a newline or the `else` seems to be missing."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_map",
        description: r##"Checks for calls to `map` followed by a `count`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_op_assign_impl",
        description: r##"Lints for suspicious operations in impls of OpAssign, e.g.
subtracting elements in an AddAssign impl."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_open_options",
        description: r##"Checks for the suspicious use of `OpenOptions::create()`
without an explicit `OpenOptions::truncate()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_operation_groupings",
        description: r##"Checks for unlikely usages of binary operators that are almost
certainly typos and/or copy/paste errors, given the other usages
of binary operators nearby."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_splitn",
        description: r##"Checks for calls to [`splitn`]
(https://doc.rust-lang.org/std/primitive.str.html#method.splitn) and
related functions with either zero or one splits."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_to_owned",
        description: r##"Checks for the usage of `_.to_owned()`, on a `Cow<'_, _>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_unary_op_formatting",
        description: r##"Checks the formatting of a unary operator on the right hand side
of a binary operator. It lints if there is no space between the binary and unary operators,
but there is a space between the unary and its operand."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::suspicious_xor_used_as_pow",
        description: r##"Warns for a Bitwise XOR (`^`) operator being probably confused as a powering. It will not trigger if any of the numbers are not in decimal."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::swap_ptr_to_ref",
        description: r##"Checks for calls to `core::mem::swap` where either parameter is derived from a pointer"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::tabs_in_doc_comments",
        description: r##"Checks doc comments for usage of tab characters."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::temporary_assignment",
        description: r##"Checks for construction of a structure or tuple just to
assign a value in it."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::test_attr_in_doctest",
        description: r##"Checks for `#[test]` in doctests unless they are marked with
either `ignore`, `no_run` or `compile_fail`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::tests_outside_test_module",
        description: r##"Triggers when a testing function (marked with the `#[test]` attribute) isn't inside a testing module
(marked with `#[cfg(test)]`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::to_digit_is_some",
        description: r##"Checks for `.to_digit(..).is_some()` on `char`s."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::to_string_in_format_args",
        description: r##"Checks for [`ToString::to_string`](https://doc.rust-lang.org/std/string/trait.ToString.html#tymethod.to_string)
applied to a type that implements [`Display`](https://doc.rust-lang.org/std/fmt/trait.Display.html)
in a macro that does formatting."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::to_string_trait_impl",
        description: r##"Checks for direct implementations of `ToString`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::todo",
        description: r##"Checks for usage of `todo!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::too_long_first_doc_paragraph",
        description: r##"Checks if the first line in the documentation of items listed in module page is too long."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::too_many_arguments",
        description: r##"Checks for functions with too many parameters."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::too_many_lines",
        description: r##"Checks for functions with a large amount of lines."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::toplevel_ref_arg",
        description: r##"Checks for function arguments and let bindings denoted as
`ref`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::trailing_empty_array",
        description: r##"Displays a warning when a struct with a trailing zero-sized array is declared without a `repr` attribute."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::trait_duplication_in_bounds",
        description: r##"Checks for cases where generics or trait objects are being used and multiple
syntax specifications for trait bounds are used simultaneously."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_bytes_to_str",
        description: r##"Checks for transmutes from a `&[u8]` to a `&str`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_float_to_int",
        description: r##"Checks for transmutes from a float to an integer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_int_to_bool",
        description: r##"Checks for transmutes from an integer to a `bool`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_int_to_char",
        description: r##"Checks for transmutes from an integer to a `char`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_int_to_float",
        description: r##"Checks for transmutes from an integer to a float."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_int_to_non_zero",
        description: r##"Checks for transmutes from `T` to `NonZero<T>`, and suggests the `new_unchecked`
method instead."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_null_to_fn",
        description: r##"Checks for null function pointer creation through transmute."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_num_to_bytes",
        description: r##"Checks for transmutes from a number to an array of `u8`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_ptr_to_ptr",
        description: r##"Checks for transmutes from a pointer to a pointer, or
from a reference to a reference."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_ptr_to_ref",
        description: r##"Checks for transmutes from a pointer to a reference."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmute_undefined_repr",
        description: r##"Checks for transmutes between types which do not have a representation defined relative to
each other."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmutes_expressible_as_ptr_casts",
        description: r##"Checks for transmutes that could be a pointer cast."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::transmuting_null",
        description: r##"Checks for transmute calls which would receive a null pointer."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::trim_split_whitespace",
        description: r##"Warns about calling `str::trim` (or variants) before `str::split_whitespace`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::trivial_regex",
        description: r##"Checks for trivial [regex](https://crates.io/crates/regex)
creation (with `Regex::new`, `RegexBuilder::new`, or `RegexSet::new`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::trivially_copy_pass_by_ref",
        description: r##"Checks for functions taking arguments by reference, where
the argument type is `Copy` and small enough to be more efficient to always
pass by value."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::try_err",
        description: r##"Checks for usage of `Err(x)?`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::tuple_array_conversions",
        description: r##"Checks for tuple<=>array conversions that are not done with `.into()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::type_complexity",
        description: r##"Checks for types used in structs, parameters and `let`
declarations above a certain complexity threshold."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::type_id_on_box",
        description: r##"Looks for calls to `.type_id()` on a `Box<dyn _>`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::type_repetition_in_bounds",
        description: r##"This lint warns about unnecessary type repetitions in trait bounds"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unchecked_duration_subtraction",
        description: r##"Lints subtraction between an `Instant` and a `Duration`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unconditional_recursion",
        description: r##"Checks that there isn't an infinite recursion in trait
implementations."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::undocumented_unsafe_blocks",
        description: r##"Checks for `unsafe` blocks and impls without a `// SAFETY: ` comment
explaining why the unsafe operations performed inside
the block are safe.

Note the comment must appear on the line(s) preceding the unsafe block
with nothing appearing in between. The following is ok:
```rust
foo(
    // SAFETY:
    // This is a valid safety comment
    unsafe { *x }
)
```
But neither of these are:
```rust
// SAFETY:
// This is not a valid safety comment
foo(
    /* SAFETY: Neither is this */ unsafe { *x },
);
```"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unicode_not_nfc",
        description: r##"Checks for string literals that contain Unicode in a form
that is not equal to its
[NFC-recomposition](http://www.unicode.org/reports/tr15/#Norm_Forms)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unimplemented",
        description: r##"Checks for usage of `unimplemented!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::uninhabited_references",
        description: r##"It detects references to uninhabited types, such as `!` and
warns when those are either dereferenced or returned from a function."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::uninit_assumed_init",
        description: r##"Checks for `MaybeUninit::uninit().assume_init()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::uninit_vec",
        description: r##"Checks for `set_len()` call that creates `Vec` with uninitialized elements.
This is commonly caused by calling `set_len()` right after allocating or
reserving a buffer with `new()`, `default()`, `with_capacity()`, or `reserve()`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::uninlined_format_args",
        description: r##"Detect when a variable is not inlined in a format string,
and suggests to inline it."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unit_arg",
        description: r##"Checks for passing a unit value as an argument to a function without using a
unit literal (`()`)."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unit_cmp",
        description: r##"Checks for comparisons to unit. This includes all binary
comparisons (like `==` and `<`) and asserts."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unit_hash",
        description: r##"Detects `().hash(_)`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unit_return_expecting_ord",
        description: r##"Checks for functions that expect closures of type
Fn(...) -> Ord where the implemented closure returns the unit type.
The lint also suggests to remove the semi-colon at the end of the statement if present."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_box_returns",
        description: r##"Checks for a return type containing a `Box<T>` where `T` implements `Sized`

The lint ignores `Box<T>` where `T` is larger than `unnecessary_box_size`,
as returning a large `T` directly may be detrimental to performance."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_cast",
        description: r##"Checks for casts to the same type, casts of int literals to integer
types, casts of float literals to float types, and casts between raw
pointers that don't change type or constness."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_clippy_cfg",
        description: r##"Checks for `#[cfg_attr(clippy, allow(clippy::lint))]`
and suggests to replace it with `#[allow(clippy::lint)]`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_fallible_conversions",
        description: r##"Checks for calls to `TryInto::try_into` and `TryFrom::try_from` when their infallible counterparts
could be used."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_filter_map",
        description: r##"Checks for `filter_map` calls that could be replaced by `filter` or `map`.
More specifically it checks if the closure provided is only performing one of the
filter or map operations and suggests the appropriate option."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_find_map",
        description: r##"Checks for `find_map` calls that could be replaced by `find` or `map`. More
specifically it checks if the closure provided is only performing one of the
find or map operations and suggests the appropriate option."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_first_then_check",
        description: r##"Checks the usage of `.first().is_some()` or `.first().is_none()` to check if a slice is
empty."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_fold",
        description: r##"Checks for usage of `fold` when a more succinct alternative exists.
Specifically, this checks for `fold`s which could be replaced by `any`, `all`,
`sum` or `product`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_get_then_check",
        description: r##"Checks the usage of `.get().is_some()` or `.get().is_none()` on std map types."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_join",
        description: r##"Checks for usage of `.collect::<Vec<String>>().join()` on iterators."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_lazy_evaluations",
        description: r##"As the counterpart to `or_fun_call`, this lint looks for unnecessary
lazily evaluated closures on `Option` and `Result`.

This lint suggests changing the following functions, when eager evaluation results in
simpler code:
 - `unwrap_or_else` to `unwrap_or`
 - `and_then` to `and`
 - `or_else` to `or`
 - `get_or_insert_with` to `get_or_insert`
 - `ok_or_else` to `ok_or`
 - `then` to `then_some` (for msrv >= 1.62.0)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_literal_unwrap",
        description: r##"Checks for `.unwrap()` related calls on `Result`s and `Option`s that are constructed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_map_on_constructor",
        description: r##"Suggests removing the use of a `map()` (or `map_err()`) method when an `Option` or `Result`
is being constructed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_min_or_max",
        description: r##"Checks for unnecessary calls to `min()` or `max()` in the following cases
- Either both side is constant
- One side is clearly larger than the other, like i32::MIN and an i32 variable"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_mut_passed",
        description: r##"Detects passing a mutable reference to a function that only
requires an immutable reference."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_operation",
        description: r##"Checks for expression statements that can be reduced to a
sub-expression."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_owned_empty_strings",
        description: r##"Detects cases of owned empty strings being passed as an argument to a function expecting `&str`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_result_map_or_else",
        description: r##"Checks for usage of `.map_or_else()` map closure for `Result` type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_safety_comment",
        description: r##"Checks for `// SAFETY: ` comments on safe code."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_safety_doc",
        description: r##"Checks for the doc comments of publicly visible
safe functions and traits and warns if there is a `# Safety` section."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_self_imports",
        description: r##"Checks for imports ending in `::{self}`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_sort_by",
        description: r##"Checks for usage of `Vec::sort_by` passing in a closure
which compares the two arguments, either directly or indirectly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_struct_initialization",
        description: r##"Checks for initialization of an identical `struct` from another instance
of the type, either by copying a base without setting any field or by
moving all fields individually."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_to_owned",
        description: r##"Checks for unnecessary calls to [`ToOwned::to_owned`](https://doc.rust-lang.org/std/borrow/trait.ToOwned.html#tymethod.to_owned)
and other `to_owned`-like functions."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_unwrap",
        description: r##"Checks for calls of `unwrap[_err]()` that cannot fail."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnecessary_wraps",
        description: r##"Checks for private functions that only return `Ok` or `Some`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unneeded_field_pattern",
        description: r##"Checks for structure field patterns bound to wildcards."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unneeded_wildcard_pattern",
        description: r##"Checks for tuple patterns with a wildcard
pattern (`_`) is next to a rest pattern (`..`).

_NOTE_: While `_, ..` means there is at least one element left, `..`
means there are 0 or more elements left. This can make a difference
when refactoring, but shouldn't result in errors in the refactored code,
since the wildcard pattern isn't used anyway."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unnested_or_patterns",
        description: r##"Checks for unnested or-patterns, e.g., `Some(0) | Some(2)` and
suggests replacing the pattern with a nested one, `Some(0 | 2)`.

Another way to think of this is that it rewrites patterns in
*disjunctive normal form (DNF)* into *conjunctive normal form (CNF)*."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unreachable",
        description: r##"Checks for usage of `unreachable!`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unreadable_literal",
        description: r##"Warns if a long integral or floating-point constant does
not contain underscores."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unsafe_derive_deserialize",
        description: r##"Checks for deriving `serde::Deserialize` on a type that
has methods using `unsafe`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unsafe_removed_from_name",
        description: r##"Checks for imports that remove unsafe from an item's
name."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unsafe_vector_initialization",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unseparated_literal_suffix",
        description: r##"Warns if literal suffixes are not separated by an
underscore.
To enforce unseparated literal suffix style,
see the `separated_literal_suffix` lint."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unsound_collection_transmute",
        description: r##"Checks for transmutes between collections whose
types have different ABI, size or alignment."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unstable_as_mut_slice",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unstable_as_slice",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_async",
        description: r##"Checks for functions that are declared `async` but have no `.await`s inside of them."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_collect",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_enumerate_index",
        description: r##"Checks for uses of the `enumerate` method where the index is unused (`_`)"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_format_specs",
        description: r##"Detects [formatting parameters] that have no effect on the output of
`format!()`, `println!()` or similar macros."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_io_amount",
        description: r##"Checks for unused written/read amount."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_peekable",
        description: r##"Checks for the creation of a `peekable` iterator that is never `.peek()`ed"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_result_ok",
        description: r##"Checks for calls to `Result::ok()` without using the returned `Option`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_rounding",
        description: r##"Detects cases where a whole-number literal float is being rounded, using
the `floor`, `ceil`, or `round` methods."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_self",
        description: r##"Checks methods that contain a `self` argument but don't use it"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_trait_names",
        description: r##"Checks for `use Trait` where the Trait is only used for its methods and not referenced by a path directly."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unused_unit",
        description: r##"Checks for unit (`()`) expressions that can be removed."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unusual_byte_groupings",
        description: r##"Warns if hexadecimal or binary literals are not grouped
by nibble or byte."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unwrap_in_result",
        description: r##"Checks for functions of type `Result` that contain `expect()` or `unwrap()`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unwrap_or_default",
        description: r##"Checks for usages of the following functions with an argument that constructs a default value
(e.g., `Default::default` or `String::new`):
- `unwrap_or`
- `unwrap_or_else`
- `or_insert`
- `or_insert_with`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::unwrap_used",
        description: r##"Checks for `.unwrap()` or `.unwrap_err()` calls on `Result`s and `.unwrap()` call on `Option`s."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::upper_case_acronyms",
        description: r##"Checks for fully capitalized names and optionally names containing a capitalized acronym."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::use_debug",
        description: r##"Checks for usage of `Debug` formatting. The purpose of this
lint is to catch debugging remnants."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::use_self",
        description: r##"Checks for unnecessary repetition of structure name when a
replacement with `Self` is applicable."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::used_underscore_binding",
        description: r##"Checks for the use of bindings with a single leading
underscore."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::used_underscore_items",
        description: r##"Checks for the use of item with a single leading
underscore."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_asref",
        description: r##"Checks for usage of `.as_ref()` or `.as_mut()` where the
types before and after the call are the same."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_attribute",
        description: r##"Checks for `extern crate` and `use` items annotated with
lint attributes.

This lint permits lint attributes for lints emitted on the items themself.
For `use` items these lints are:
* ambiguous_glob_reexports
* dead_code
* deprecated
* hidden_glob_reexports
* unreachable_pub
* unused
* unused_braces
* unused_import_braces
* clippy::disallowed_types
* clippy::enum_glob_use
* clippy::macro_use_imports
* clippy::module_name_repetitions
* clippy::redundant_pub_crate
* clippy::single_component_path_imports
* clippy::unsafe_removed_from_name
* clippy::wildcard_imports

For `extern crate` items these lints are:
* `unused_imports` on items with `#[macro_use]`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_conversion",
        description: r##"Checks for `Into`, `TryInto`, `From`, `TryFrom`, or `IntoIter` calls
which uselessly convert to the same type."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_format",
        description: r##"Checks for the use of `format!(string literal with no
argument)` and `format!({}, foo)` where `foo` is a string."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_let_if_seq",
        description: r##"Checks for variable declarations immediately followed by a
conditional affectation."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_transmute",
        description: r##"Checks for transmutes to the original type of the object
and transmutes that could be a cast."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::useless_vec",
        description: r##"Checks for usage of `vec![..]` when using `[..]` would
be possible."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::vec_box",
        description: r##"Checks for usage of `Vec<Box<T>>` where T: Sized anywhere in the code.
Check the [Box documentation](https://doc.rust-lang.org/std/boxed/index.html) for more information."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::vec_init_then_push",
        description: r##"Checks for calls to `push` immediately after creating a new `Vec`.

If the `Vec` is created using `with_capacity` this will only lint if the capacity is a
constant and the number of pushes is greater than or equal to the initial capacity.

If the `Vec` is extended after the initial sequence of pushes and it was default initialized
then this will only lint after there were at least four pushes. This number may change in
the future."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::vec_resize_to_zero",
        description: r##"Finds occurrences of `Vec::resize(0, an_int)`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::verbose_bit_mask",
        description: r##"Checks for bit masks that can be replaced by a call
to `trailing_zeros`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::verbose_file_reads",
        description: r##"Checks for usage of File::read_to_end and File::read_to_string."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::waker_clone_wake",
        description: r##"Checks for usage of `waker.clone().wake()`"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::while_float",
        description: r##"Checks for while loops comparing floating point values."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::while_immutable_condition",
        description: r##"Checks whether variables used within while loop condition
can be (and are) mutated in the body."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::while_let_loop",
        description: r##"Detects `loop + match` combinations that are easier
written as a `while let` loop."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::while_let_on_iterator",
        description: r##"Checks for `while let` expressions on iterators."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wildcard_dependencies",
        description: r##"Checks for wildcard dependencies in the `Cargo.toml`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wildcard_enum_match_arm",
        description: r##"Checks for wildcard enum matches using `_`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wildcard_imports",
        description: r##"Checks for wildcard imports `use _::*`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wildcard_in_or_patterns",
        description: r##"Checks for wildcard pattern used with others patterns in same match arm."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::write_literal",
        description: r##"This lint warns about the use of literals as `write!`/`writeln!` args."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::write_with_newline",
        description: r##"This lint warns when you use `write!()` with a format
string that
ends in a newline."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::writeln_empty_string",
        description: r##"This lint warns when you use `writeln!(buf, )` to
print a newline."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wrong_pub_self_convention",
        description: r##"Nothing. This lint has been deprecated"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wrong_self_convention",
        description: r##"Checks for methods with certain name prefixes or suffixes, and which
do not adhere to standard conventions regarding how `self` is taken.
The actual rules are:

|Prefix |Postfix     |`self` taken                   | `self` type  |
|-------|------------|-------------------------------|--------------|
|`as_`  | none       |`&self` or `&mut self`         | any          |
|`from_`| none       | none                          | any          |
|`into_`| none       |`self`                         | any          |
|`is_`  | none       |`&mut self` or `&self` or none | any          |
|`to_`  | `_mut`     |`&mut self`                    | any          |
|`to_`  | not `_mut` |`self`                         | `Copy`       |
|`to_`  | not `_mut` |`&self`                        | not `Copy`   |

Note: Clippy doesn't trigger methods with `to_` prefix in:
- Traits definition.
Clippy can not tell if a type that implements a trait is `Copy` or not.
- Traits implementation, when `&self` is taken.
The method signature is controlled by the trait and often `&self` is required for all types that implement the trait
(see e.g. the `std::string::ToString` trait).

Clippy allows `Pin<&Self>` and `Pin<&mut Self>` if `&self` and `&mut self` is required.

Please find more info here:
https://rust-lang.github.io/api-guidelines/naming.html#ad-hoc-conversions-follow-as_-to_-into_-conventions-c-conv"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::wrong_transmute",
        description: r##"Checks for transmutes that can't ever be correct on any
architecture."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zero_divided_by_zero",
        description: r##"Checks for `0.0 / 0.0`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zero_prefixed_literal",
        description: r##"Warns if an integral constant literal starts with `0`."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zero_ptr",
        description: r##"Catch casts from `0` to some pointer type"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zero_repeat_side_effects",
        description: r##"Checks for array or vec initializations which call a function or method,
but which have a repeat count of zero."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zero_sized_map_values",
        description: r##"Checks for maps with zero-sized value types anywhere in the code."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zombie_processes",
        description: r##"Looks for code that spawns a process but never calls `wait()` on the child."##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
    Lint {
        label: "clippy::zst_offset",
        description: r##"Checks for `offset(_)`, `wrapping_`{`add`, `sub`}, etc. on raw pointers to
zero-sized types"##,
        default_severity: Severity::Allow,
        warn_since: None,
        deny_since: None,
    },
];
pub const CLIPPY_LINT_GROUPS: &[LintGroup] = &[
    LintGroup {
        lint: Lint {
            label: "clippy::cargo",
            description: r##"lint group for: clippy::cargo_common_metadata, clippy::multiple_crate_versions, clippy::negative_feature_names, clippy::redundant_feature_names, clippy::wildcard_dependencies"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::cargo_common_metadata",
            "clippy::multiple_crate_versions",
            "clippy::negative_feature_names",
            "clippy::redundant_feature_names",
            "clippy::wildcard_dependencies",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::complexity",
            description: r##"lint group for: clippy::bind_instead_of_map, clippy::bool_comparison, clippy::borrow_deref_ref, clippy::borrowed_box, clippy::bytes_count_to_len, clippy::char_lit_as_u8, clippy::clone_on_copy, clippy::crosspointer_transmute, clippy::default_constructed_unit_structs, clippy::deprecated_cfg_attr, clippy::deref_addrof, clippy::derivable_impls, clippy::diverging_sub_expression, clippy::double_comparisons, clippy::double_parens, clippy::duration_subsec, clippy::excessive_nesting, clippy::explicit_auto_deref, clippy::explicit_counter_loop, clippy::explicit_write, clippy::extra_unused_lifetimes, clippy::extra_unused_type_parameters, clippy::filter_map_identity, clippy::filter_next, clippy::flat_map_identity, clippy::get_last_with_len, clippy::identity_op, clippy::implied_bounds_in_impls, clippy::inspect_for_each, clippy::int_plus_one, clippy::iter_count, clippy::iter_kv_map, clippy::let_with_type_underscore, clippy::manual_c_str_literals, clippy::manual_clamp, clippy::manual_div_ceil, clippy::manual_filter, clippy::manual_filter_map, clippy::manual_find, clippy::manual_find_map, clippy::manual_flatten, clippy::manual_hash_one, clippy::manual_inspect, clippy::manual_is_power_of_two, clippy::manual_main_separator_str, clippy::manual_range_patterns, clippy::manual_rem_euclid, clippy::manual_slice_size_calculation, clippy::manual_split_once, clippy::manual_strip, clippy::manual_swap, clippy::manual_unwrap_or, clippy::map_flatten, clippy::map_identity, clippy::match_as_ref, clippy::match_single_binding, clippy::needless_arbitrary_self_type, clippy::needless_bool, clippy::needless_bool_assign, clippy::needless_borrowed_reference, clippy::needless_if, clippy::needless_lifetimes, clippy::needless_match, clippy::needless_option_as_deref, clippy::needless_option_take, clippy::needless_question_mark, clippy::needless_splitn, clippy::needless_update, clippy::neg_cmp_op_on_partial_ord, clippy::no_effect, clippy::nonminimal_bool, clippy::only_used_in_recursion, clippy::option_as_ref_deref, clippy::option_filter_map, clippy::option_map_unit_fn, clippy::or_then_unwrap, clippy::partialeq_ne_impl, clippy::precedence, clippy::ptr_offset_with_cast, clippy::range_zip_with_len, clippy::redundant_as_str, clippy::redundant_async_block, clippy::redundant_at_rest_pattern, clippy::redundant_closure_call, clippy::redundant_guards, clippy::redundant_slicing, clippy::repeat_once, clippy::reserve_after_initialization, clippy::result_filter_map, clippy::result_map_unit_fn, clippy::search_is_some, clippy::seek_from_current, clippy::seek_to_start_instead_of_rewind, clippy::short_circuit_statement, clippy::single_element_loop, clippy::skip_while_next, clippy::string_from_utf8_as_bytes, clippy::strlen_on_c_strings, clippy::temporary_assignment, clippy::too_many_arguments, clippy::transmute_bytes_to_str, clippy::transmute_float_to_int, clippy::transmute_int_to_bool, clippy::transmute_int_to_char, clippy::transmute_int_to_float, clippy::transmute_int_to_non_zero, clippy::transmute_num_to_bytes, clippy::transmute_ptr_to_ref, clippy::transmutes_expressible_as_ptr_casts, clippy::type_complexity, clippy::unit_arg, clippy::unnecessary_cast, clippy::unnecessary_filter_map, clippy::unnecessary_find_map, clippy::unnecessary_first_then_check, clippy::unnecessary_literal_unwrap, clippy::unnecessary_map_on_constructor, clippy::unnecessary_min_or_max, clippy::unnecessary_operation, clippy::unnecessary_sort_by, clippy::unnecessary_unwrap, clippy::unneeded_wildcard_pattern, clippy::unused_format_specs, clippy::useless_asref, clippy::useless_conversion, clippy::useless_format, clippy::useless_transmute, clippy::vec_box, clippy::while_let_loop, clippy::wildcard_in_or_patterns, clippy::zero_divided_by_zero, clippy::zero_prefixed_literal"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::bind_instead_of_map",
            "clippy::bool_comparison",
            "clippy::borrow_deref_ref",
            "clippy::borrowed_box",
            "clippy::bytes_count_to_len",
            "clippy::char_lit_as_u8",
            "clippy::clone_on_copy",
            "clippy::crosspointer_transmute",
            "clippy::default_constructed_unit_structs",
            "clippy::deprecated_cfg_attr",
            "clippy::deref_addrof",
            "clippy::derivable_impls",
            "clippy::diverging_sub_expression",
            "clippy::double_comparisons",
            "clippy::double_parens",
            "clippy::duration_subsec",
            "clippy::excessive_nesting",
            "clippy::explicit_auto_deref",
            "clippy::explicit_counter_loop",
            "clippy::explicit_write",
            "clippy::extra_unused_lifetimes",
            "clippy::extra_unused_type_parameters",
            "clippy::filter_map_identity",
            "clippy::filter_next",
            "clippy::flat_map_identity",
            "clippy::get_last_with_len",
            "clippy::identity_op",
            "clippy::implied_bounds_in_impls",
            "clippy::inspect_for_each",
            "clippy::int_plus_one",
            "clippy::iter_count",
            "clippy::iter_kv_map",
            "clippy::let_with_type_underscore",
            "clippy::manual_c_str_literals",
            "clippy::manual_clamp",
            "clippy::manual_div_ceil",
            "clippy::manual_filter",
            "clippy::manual_filter_map",
            "clippy::manual_find",
            "clippy::manual_find_map",
            "clippy::manual_flatten",
            "clippy::manual_hash_one",
            "clippy::manual_inspect",
            "clippy::manual_is_power_of_two",
            "clippy::manual_main_separator_str",
            "clippy::manual_range_patterns",
            "clippy::manual_rem_euclid",
            "clippy::manual_slice_size_calculation",
            "clippy::manual_split_once",
            "clippy::manual_strip",
            "clippy::manual_swap",
            "clippy::manual_unwrap_or",
            "clippy::map_flatten",
            "clippy::map_identity",
            "clippy::match_as_ref",
            "clippy::match_single_binding",
            "clippy::needless_arbitrary_self_type",
            "clippy::needless_bool",
            "clippy::needless_bool_assign",
            "clippy::needless_borrowed_reference",
            "clippy::needless_if",
            "clippy::needless_lifetimes",
            "clippy::needless_match",
            "clippy::needless_option_as_deref",
            "clippy::needless_option_take",
            "clippy::needless_question_mark",
            "clippy::needless_splitn",
            "clippy::needless_update",
            "clippy::neg_cmp_op_on_partial_ord",
            "clippy::no_effect",
            "clippy::nonminimal_bool",
            "clippy::only_used_in_recursion",
            "clippy::option_as_ref_deref",
            "clippy::option_filter_map",
            "clippy::option_map_unit_fn",
            "clippy::or_then_unwrap",
            "clippy::partialeq_ne_impl",
            "clippy::precedence",
            "clippy::ptr_offset_with_cast",
            "clippy::range_zip_with_len",
            "clippy::redundant_as_str",
            "clippy::redundant_async_block",
            "clippy::redundant_at_rest_pattern",
            "clippy::redundant_closure_call",
            "clippy::redundant_guards",
            "clippy::redundant_slicing",
            "clippy::repeat_once",
            "clippy::reserve_after_initialization",
            "clippy::result_filter_map",
            "clippy::result_map_unit_fn",
            "clippy::search_is_some",
            "clippy::seek_from_current",
            "clippy::seek_to_start_instead_of_rewind",
            "clippy::short_circuit_statement",
            "clippy::single_element_loop",
            "clippy::skip_while_next",
            "clippy::string_from_utf8_as_bytes",
            "clippy::strlen_on_c_strings",
            "clippy::temporary_assignment",
            "clippy::too_many_arguments",
            "clippy::transmute_bytes_to_str",
            "clippy::transmute_float_to_int",
            "clippy::transmute_int_to_bool",
            "clippy::transmute_int_to_char",
            "clippy::transmute_int_to_float",
            "clippy::transmute_int_to_non_zero",
            "clippy::transmute_num_to_bytes",
            "clippy::transmute_ptr_to_ref",
            "clippy::transmutes_expressible_as_ptr_casts",
            "clippy::type_complexity",
            "clippy::unit_arg",
            "clippy::unnecessary_cast",
            "clippy::unnecessary_filter_map",
            "clippy::unnecessary_find_map",
            "clippy::unnecessary_first_then_check",
            "clippy::unnecessary_literal_unwrap",
            "clippy::unnecessary_map_on_constructor",
            "clippy::unnecessary_min_or_max",
            "clippy::unnecessary_operation",
            "clippy::unnecessary_sort_by",
            "clippy::unnecessary_unwrap",
            "clippy::unneeded_wildcard_pattern",
            "clippy::unused_format_specs",
            "clippy::useless_asref",
            "clippy::useless_conversion",
            "clippy::useless_format",
            "clippy::useless_transmute",
            "clippy::vec_box",
            "clippy::while_let_loop",
            "clippy::wildcard_in_or_patterns",
            "clippy::zero_divided_by_zero",
            "clippy::zero_prefixed_literal",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::correctness",
            description: r##"lint group for: clippy::absurd_extreme_comparisons, clippy::almost_swapped, clippy::approx_constant, clippy::async_yields_async, clippy::bad_bit_mask, clippy::cast_slice_different_sizes, clippy::deprecated_semver, clippy::derive_ord_xor_partial_ord, clippy::derived_hash_with_manual_eq, clippy::eager_transmute, clippy::enum_clike_unportable_variant, clippy::eq_op, clippy::erasing_op, clippy::fn_address_comparisons, clippy::if_let_mutex, clippy::ifs_same_cond, clippy::impl_hash_borrow_with_str_and_bytes, clippy::impossible_comparisons, clippy::ineffective_bit_mask, clippy::infinite_iter, clippy::inherent_to_string_shadow_display, clippy::inline_fn_without_body, clippy::invalid_null_ptr_usage, clippy::invalid_regex, clippy::inverted_saturating_sub, clippy::invisible_characters, clippy::iter_next_loop, clippy::iter_skip_zero, clippy::iterator_step_by_zero, clippy::let_underscore_lock, clippy::lint_groups_priority, clippy::match_str_case_mismatch, clippy::mem_replace_with_uninit, clippy::min_max, clippy::mistyped_literal_suffixes, clippy::modulo_one, clippy::mut_from_ref, clippy::never_loop, clippy::non_octal_unix_permissions, clippy::nonsensical_open_options, clippy::not_unsafe_ptr_arg_deref, clippy::option_env_unwrap, clippy::out_of_bounds_indexing, clippy::overly_complex_bool_expr, clippy::panicking_overflow_checks, clippy::panicking_unwrap, clippy::possible_missing_comma, clippy::read_line_without_trim, clippy::recursive_format_impl, clippy::redundant_comparisons, clippy::redundant_locals, clippy::reversed_empty_ranges, clippy::self_assignment, clippy::serde_api_misuse, clippy::size_of_in_element_count, clippy::suspicious_splitn, clippy::transmute_null_to_fn, clippy::transmuting_null, clippy::uninit_assumed_init, clippy::uninit_vec, clippy::unit_cmp, clippy::unit_hash, clippy::unit_return_expecting_ord, clippy::unsound_collection_transmute, clippy::unused_io_amount, clippy::useless_attribute, clippy::vec_resize_to_zero, clippy::while_immutable_condition, clippy::wrong_transmute, clippy::zst_offset"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::absurd_extreme_comparisons",
            "clippy::almost_swapped",
            "clippy::approx_constant",
            "clippy::async_yields_async",
            "clippy::bad_bit_mask",
            "clippy::cast_slice_different_sizes",
            "clippy::deprecated_semver",
            "clippy::derive_ord_xor_partial_ord",
            "clippy::derived_hash_with_manual_eq",
            "clippy::eager_transmute",
            "clippy::enum_clike_unportable_variant",
            "clippy::eq_op",
            "clippy::erasing_op",
            "clippy::fn_address_comparisons",
            "clippy::if_let_mutex",
            "clippy::ifs_same_cond",
            "clippy::impl_hash_borrow_with_str_and_bytes",
            "clippy::impossible_comparisons",
            "clippy::ineffective_bit_mask",
            "clippy::infinite_iter",
            "clippy::inherent_to_string_shadow_display",
            "clippy::inline_fn_without_body",
            "clippy::invalid_null_ptr_usage",
            "clippy::invalid_regex",
            "clippy::inverted_saturating_sub",
            "clippy::invisible_characters",
            "clippy::iter_next_loop",
            "clippy::iter_skip_zero",
            "clippy::iterator_step_by_zero",
            "clippy::let_underscore_lock",
            "clippy::lint_groups_priority",
            "clippy::match_str_case_mismatch",
            "clippy::mem_replace_with_uninit",
            "clippy::min_max",
            "clippy::mistyped_literal_suffixes",
            "clippy::modulo_one",
            "clippy::mut_from_ref",
            "clippy::never_loop",
            "clippy::non_octal_unix_permissions",
            "clippy::nonsensical_open_options",
            "clippy::not_unsafe_ptr_arg_deref",
            "clippy::option_env_unwrap",
            "clippy::out_of_bounds_indexing",
            "clippy::overly_complex_bool_expr",
            "clippy::panicking_overflow_checks",
            "clippy::panicking_unwrap",
            "clippy::possible_missing_comma",
            "clippy::read_line_without_trim",
            "clippy::recursive_format_impl",
            "clippy::redundant_comparisons",
            "clippy::redundant_locals",
            "clippy::reversed_empty_ranges",
            "clippy::self_assignment",
            "clippy::serde_api_misuse",
            "clippy::size_of_in_element_count",
            "clippy::suspicious_splitn",
            "clippy::transmute_null_to_fn",
            "clippy::transmuting_null",
            "clippy::uninit_assumed_init",
            "clippy::uninit_vec",
            "clippy::unit_cmp",
            "clippy::unit_hash",
            "clippy::unit_return_expecting_ord",
            "clippy::unsound_collection_transmute",
            "clippy::unused_io_amount",
            "clippy::useless_attribute",
            "clippy::vec_resize_to_zero",
            "clippy::while_immutable_condition",
            "clippy::wrong_transmute",
            "clippy::zst_offset",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::deprecated",
            description: r##"lint group for: clippy::assign_ops, clippy::extend_from_slice, clippy::misaligned_transmute, clippy::pub_enum_variant_names, clippy::range_step_by_zero, clippy::regex_macro, clippy::replace_consts, clippy::should_assert_eq, clippy::unsafe_vector_initialization, clippy::unstable_as_mut_slice, clippy::unstable_as_slice, clippy::unused_collect, clippy::wrong_pub_self_convention"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::assign_ops",
            "clippy::extend_from_slice",
            "clippy::misaligned_transmute",
            "clippy::pub_enum_variant_names",
            "clippy::range_step_by_zero",
            "clippy::regex_macro",
            "clippy::replace_consts",
            "clippy::should_assert_eq",
            "clippy::unsafe_vector_initialization",
            "clippy::unstable_as_mut_slice",
            "clippy::unstable_as_slice",
            "clippy::unused_collect",
            "clippy::wrong_pub_self_convention",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::nursery",
            description: r##"lint group for: clippy::as_ptr_cast_mut, clippy::branches_sharing_code, clippy::clear_with_drain, clippy::cognitive_complexity, clippy::collection_is_never_read, clippy::debug_assert_with_mut_call, clippy::derive_partial_eq_without_eq, clippy::equatable_if_let, clippy::fallible_impl_from, clippy::future_not_send, clippy::imprecise_flops, clippy::iter_on_empty_collections, clippy::iter_on_single_items, clippy::iter_with_drain, clippy::large_stack_frames, clippy::missing_const_for_fn, clippy::mutex_integer, clippy::needless_collect, clippy::needless_pass_by_ref_mut, clippy::non_send_fields_in_send_ty, clippy::nonstandard_macro_braces, clippy::option_if_let_else, clippy::or_fun_call, clippy::path_buf_push_overwrite, clippy::read_zero_byte_vec, clippy::redundant_clone, clippy::redundant_pub_crate, clippy::set_contains_or_insert, clippy::significant_drop_in_scrutinee, clippy::significant_drop_tightening, clippy::string_lit_as_bytes, clippy::suboptimal_flops, clippy::suspicious_operation_groupings, clippy::trailing_empty_array, clippy::trait_duplication_in_bounds, clippy::transmute_undefined_repr, clippy::trivial_regex, clippy::tuple_array_conversions, clippy::type_repetition_in_bounds, clippy::uninhabited_references, clippy::unnecessary_struct_initialization, clippy::unused_peekable, clippy::unused_rounding, clippy::use_self, clippy::useless_let_if_seq, clippy::while_float"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::as_ptr_cast_mut",
            "clippy::branches_sharing_code",
            "clippy::clear_with_drain",
            "clippy::cognitive_complexity",
            "clippy::collection_is_never_read",
            "clippy::debug_assert_with_mut_call",
            "clippy::derive_partial_eq_without_eq",
            "clippy::equatable_if_let",
            "clippy::fallible_impl_from",
            "clippy::future_not_send",
            "clippy::imprecise_flops",
            "clippy::iter_on_empty_collections",
            "clippy::iter_on_single_items",
            "clippy::iter_with_drain",
            "clippy::large_stack_frames",
            "clippy::missing_const_for_fn",
            "clippy::mutex_integer",
            "clippy::needless_collect",
            "clippy::needless_pass_by_ref_mut",
            "clippy::non_send_fields_in_send_ty",
            "clippy::nonstandard_macro_braces",
            "clippy::option_if_let_else",
            "clippy::or_fun_call",
            "clippy::path_buf_push_overwrite",
            "clippy::read_zero_byte_vec",
            "clippy::redundant_clone",
            "clippy::redundant_pub_crate",
            "clippy::set_contains_or_insert",
            "clippy::significant_drop_in_scrutinee",
            "clippy::significant_drop_tightening",
            "clippy::string_lit_as_bytes",
            "clippy::suboptimal_flops",
            "clippy::suspicious_operation_groupings",
            "clippy::trailing_empty_array",
            "clippy::trait_duplication_in_bounds",
            "clippy::transmute_undefined_repr",
            "clippy::trivial_regex",
            "clippy::tuple_array_conversions",
            "clippy::type_repetition_in_bounds",
            "clippy::uninhabited_references",
            "clippy::unnecessary_struct_initialization",
            "clippy::unused_peekable",
            "clippy::unused_rounding",
            "clippy::use_self",
            "clippy::useless_let_if_seq",
            "clippy::while_float",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::pedantic",
            description: r##"lint group for: clippy::assigning_clones, clippy::bool_to_int_with_if, clippy::borrow_as_ptr, clippy::case_sensitive_file_extension_comparisons, clippy::cast_lossless, clippy::cast_possible_truncation, clippy::cast_possible_wrap, clippy::cast_precision_loss, clippy::cast_ptr_alignment, clippy::cast_sign_loss, clippy::checked_conversions, clippy::cloned_instead_of_copied, clippy::copy_iterator, clippy::default_trait_access, clippy::doc_link_with_quotes, clippy::doc_markdown, clippy::empty_enum, clippy::enum_glob_use, clippy::expl_impl_clone_on_copy, clippy::explicit_deref_methods, clippy::explicit_into_iter_loop, clippy::explicit_iter_loop, clippy::filter_map_next, clippy::flat_map_option, clippy::float_cmp, clippy::fn_params_excessive_bools, clippy::from_iter_instead_of_collect, clippy::if_not_else, clippy::ignored_unit_patterns, clippy::implicit_clone, clippy::implicit_hasher, clippy::inconsistent_struct_constructor, clippy::index_refutable_slice, clippy::inefficient_to_string, clippy::inline_always, clippy::into_iter_without_iter, clippy::invalid_upcast_comparisons, clippy::items_after_statements, clippy::iter_filter_is_ok, clippy::iter_filter_is_some, clippy::iter_not_returning_iterator, clippy::iter_without_into_iter, clippy::large_digit_groups, clippy::large_futures, clippy::large_stack_arrays, clippy::large_types_passed_by_value, clippy::linkedlist, clippy::macro_use_imports, clippy::manual_assert, clippy::manual_instant_elapsed, clippy::manual_is_variant_and, clippy::manual_let_else, clippy::manual_ok_or, clippy::manual_string_new, clippy::many_single_char_names, clippy::map_unwrap_or, clippy::match_bool, clippy::match_on_vec_items, clippy::match_same_arms, clippy::match_wild_err_arm, clippy::match_wildcard_for_single_variants, clippy::maybe_infinite_iter, clippy::mismatching_type_param_order, clippy::missing_errors_doc, clippy::missing_fields_in_debug, clippy::missing_panics_doc, clippy::module_name_repetitions, clippy::must_use_candidate, clippy::mut_mut, clippy::naive_bytecount, clippy::needless_bitwise_bool, clippy::needless_continue, clippy::needless_for_each, clippy::needless_pass_by_value, clippy::needless_raw_string_hashes, clippy::no_effect_underscore_binding, clippy::no_mangle_with_rust_abi, clippy::option_as_ref_cloned, clippy::option_option, clippy::ptr_as_ptr, clippy::ptr_cast_constness, clippy::pub_underscore_fields, clippy::range_minus_one, clippy::range_plus_one, clippy::redundant_closure_for_method_calls, clippy::redundant_else, clippy::ref_as_ptr, clippy::ref_binding_to_reference, clippy::ref_option, clippy::ref_option_ref, clippy::return_self_not_must_use, clippy::same_functions_in_if_condition, clippy::semicolon_if_nothing_returned, clippy::should_panic_without_expect, clippy::similar_names, clippy::single_char_pattern, clippy::single_match_else, clippy::stable_sort_primitive, clippy::str_split_at_newline, clippy::string_add_assign, clippy::struct_excessive_bools, clippy::struct_field_names, clippy::too_many_lines, clippy::transmute_ptr_to_ptr, clippy::trivially_copy_pass_by_ref, clippy::unchecked_duration_subtraction, clippy::unicode_not_nfc, clippy::uninlined_format_args, clippy::unnecessary_box_returns, clippy::unnecessary_join, clippy::unnecessary_wraps, clippy::unnested_or_patterns, clippy::unreadable_literal, clippy::unsafe_derive_deserialize, clippy::unused_async, clippy::unused_self, clippy::used_underscore_binding, clippy::used_underscore_items, clippy::verbose_bit_mask, clippy::wildcard_imports, clippy::zero_sized_map_values"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::assigning_clones",
            "clippy::bool_to_int_with_if",
            "clippy::borrow_as_ptr",
            "clippy::case_sensitive_file_extension_comparisons",
            "clippy::cast_lossless",
            "clippy::cast_possible_truncation",
            "clippy::cast_possible_wrap",
            "clippy::cast_precision_loss",
            "clippy::cast_ptr_alignment",
            "clippy::cast_sign_loss",
            "clippy::checked_conversions",
            "clippy::cloned_instead_of_copied",
            "clippy::copy_iterator",
            "clippy::default_trait_access",
            "clippy::doc_link_with_quotes",
            "clippy::doc_markdown",
            "clippy::empty_enum",
            "clippy::enum_glob_use",
            "clippy::expl_impl_clone_on_copy",
            "clippy::explicit_deref_methods",
            "clippy::explicit_into_iter_loop",
            "clippy::explicit_iter_loop",
            "clippy::filter_map_next",
            "clippy::flat_map_option",
            "clippy::float_cmp",
            "clippy::fn_params_excessive_bools",
            "clippy::from_iter_instead_of_collect",
            "clippy::if_not_else",
            "clippy::ignored_unit_patterns",
            "clippy::implicit_clone",
            "clippy::implicit_hasher",
            "clippy::inconsistent_struct_constructor",
            "clippy::index_refutable_slice",
            "clippy::inefficient_to_string",
            "clippy::inline_always",
            "clippy::into_iter_without_iter",
            "clippy::invalid_upcast_comparisons",
            "clippy::items_after_statements",
            "clippy::iter_filter_is_ok",
            "clippy::iter_filter_is_some",
            "clippy::iter_not_returning_iterator",
            "clippy::iter_without_into_iter",
            "clippy::large_digit_groups",
            "clippy::large_futures",
            "clippy::large_stack_arrays",
            "clippy::large_types_passed_by_value",
            "clippy::linkedlist",
            "clippy::macro_use_imports",
            "clippy::manual_assert",
            "clippy::manual_instant_elapsed",
            "clippy::manual_is_variant_and",
            "clippy::manual_let_else",
            "clippy::manual_ok_or",
            "clippy::manual_string_new",
            "clippy::many_single_char_names",
            "clippy::map_unwrap_or",
            "clippy::match_bool",
            "clippy::match_on_vec_items",
            "clippy::match_same_arms",
            "clippy::match_wild_err_arm",
            "clippy::match_wildcard_for_single_variants",
            "clippy::maybe_infinite_iter",
            "clippy::mismatching_type_param_order",
            "clippy::missing_errors_doc",
            "clippy::missing_fields_in_debug",
            "clippy::missing_panics_doc",
            "clippy::module_name_repetitions",
            "clippy::must_use_candidate",
            "clippy::mut_mut",
            "clippy::naive_bytecount",
            "clippy::needless_bitwise_bool",
            "clippy::needless_continue",
            "clippy::needless_for_each",
            "clippy::needless_pass_by_value",
            "clippy::needless_raw_string_hashes",
            "clippy::no_effect_underscore_binding",
            "clippy::no_mangle_with_rust_abi",
            "clippy::option_as_ref_cloned",
            "clippy::option_option",
            "clippy::ptr_as_ptr",
            "clippy::ptr_cast_constness",
            "clippy::pub_underscore_fields",
            "clippy::range_minus_one",
            "clippy::range_plus_one",
            "clippy::redundant_closure_for_method_calls",
            "clippy::redundant_else",
            "clippy::ref_as_ptr",
            "clippy::ref_binding_to_reference",
            "clippy::ref_option",
            "clippy::ref_option_ref",
            "clippy::return_self_not_must_use",
            "clippy::same_functions_in_if_condition",
            "clippy::semicolon_if_nothing_returned",
            "clippy::should_panic_without_expect",
            "clippy::similar_names",
            "clippy::single_char_pattern",
            "clippy::single_match_else",
            "clippy::stable_sort_primitive",
            "clippy::str_split_at_newline",
            "clippy::string_add_assign",
            "clippy::struct_excessive_bools",
            "clippy::struct_field_names",
            "clippy::too_many_lines",
            "clippy::transmute_ptr_to_ptr",
            "clippy::trivially_copy_pass_by_ref",
            "clippy::unchecked_duration_subtraction",
            "clippy::unicode_not_nfc",
            "clippy::uninlined_format_args",
            "clippy::unnecessary_box_returns",
            "clippy::unnecessary_join",
            "clippy::unnecessary_wraps",
            "clippy::unnested_or_patterns",
            "clippy::unreadable_literal",
            "clippy::unsafe_derive_deserialize",
            "clippy::unused_async",
            "clippy::unused_self",
            "clippy::used_underscore_binding",
            "clippy::used_underscore_items",
            "clippy::verbose_bit_mask",
            "clippy::wildcard_imports",
            "clippy::zero_sized_map_values",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::perf",
            description: r##"lint group for: clippy::box_collection, clippy::boxed_local, clippy::cmp_owned, clippy::collapsible_str_replace, clippy::drain_collect, clippy::expect_fun_call, clippy::extend_with_drain, clippy::format_collect, clippy::format_in_format_args, clippy::iter_overeager_cloned, clippy::large_const_arrays, clippy::large_enum_variant, clippy::manual_memcpy, clippy::manual_retain, clippy::manual_str_repeat, clippy::manual_try_fold, clippy::map_entry, clippy::missing_const_for_thread_local, clippy::missing_spin_loop, clippy::readonly_write_lock, clippy::redundant_allocation, clippy::result_large_err, clippy::slow_vector_initialization, clippy::to_string_in_format_args, clippy::unnecessary_to_owned, clippy::useless_vec, clippy::vec_init_then_push, clippy::waker_clone_wake"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::box_collection",
            "clippy::boxed_local",
            "clippy::cmp_owned",
            "clippy::collapsible_str_replace",
            "clippy::drain_collect",
            "clippy::expect_fun_call",
            "clippy::extend_with_drain",
            "clippy::format_collect",
            "clippy::format_in_format_args",
            "clippy::iter_overeager_cloned",
            "clippy::large_const_arrays",
            "clippy::large_enum_variant",
            "clippy::manual_memcpy",
            "clippy::manual_retain",
            "clippy::manual_str_repeat",
            "clippy::manual_try_fold",
            "clippy::map_entry",
            "clippy::missing_const_for_thread_local",
            "clippy::missing_spin_loop",
            "clippy::readonly_write_lock",
            "clippy::redundant_allocation",
            "clippy::result_large_err",
            "clippy::slow_vector_initialization",
            "clippy::to_string_in_format_args",
            "clippy::unnecessary_to_owned",
            "clippy::useless_vec",
            "clippy::vec_init_then_push",
            "clippy::waker_clone_wake",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::restriction",
            description: r##"lint group for: clippy::absolute_paths, clippy::alloc_instead_of_core, clippy::allow_attributes, clippy::allow_attributes_without_reason, clippy::arithmetic_side_effects, clippy::as_conversions, clippy::as_underscore, clippy::assertions_on_result_states, clippy::big_endian_bytes, clippy::cfg_not_test, clippy::clone_on_ref_ptr, clippy::create_dir, clippy::dbg_macro, clippy::decimal_literal_representation, clippy::default_numeric_fallback, clippy::default_union_representation, clippy::deref_by_slicing, clippy::disallowed_script_idents, clippy::else_if_without_else, clippy::empty_drop, clippy::empty_enum_variants_with_brackets, clippy::empty_structs_with_brackets, clippy::error_impl_error, clippy::exhaustive_enums, clippy::exhaustive_structs, clippy::exit, clippy::expect_used, clippy::field_scoped_visibility_modifiers, clippy::filetype_is_file, clippy::float_arithmetic, clippy::float_cmp_const, clippy::fn_to_numeric_cast_any, clippy::format_push_string, clippy::get_unwrap, clippy::host_endian_bytes, clippy::if_then_some_else_none, clippy::impl_trait_in_params, clippy::implicit_return, clippy::indexing_slicing, clippy::infinite_loop, clippy::inline_asm_x86_att_syntax, clippy::inline_asm_x86_intel_syntax, clippy::integer_division, clippy::integer_division_remainder_used, clippy::iter_over_hash_type, clippy::large_include_file, clippy::let_underscore_must_use, clippy::let_underscore_untyped, clippy::little_endian_bytes, clippy::lossy_float_literal, clippy::map_err_ignore, clippy::mem_forget, clippy::min_ident_chars, clippy::missing_assert_message, clippy::missing_asserts_for_indexing, clippy::missing_docs_in_private_items, clippy::missing_inline_in_public_items, clippy::missing_trait_methods, clippy::mixed_read_write_in_expression, clippy::mod_module_files, clippy::modulo_arithmetic, clippy::multiple_inherent_impl, clippy::multiple_unsafe_ops_per_block, clippy::mutex_atomic, clippy::needless_raw_strings, clippy::non_ascii_literal, clippy::non_zero_suggestions, clippy::panic, clippy::panic_in_result_fn, clippy::partial_pub_fields, clippy::pathbuf_init_then_push, clippy::pattern_type_mismatch, clippy::print_stderr, clippy::print_stdout, clippy::pub_use, clippy::pub_with_shorthand, clippy::pub_without_shorthand, clippy::question_mark_used, clippy::rc_buffer, clippy::rc_mutex, clippy::redundant_type_annotations, clippy::ref_patterns, clippy::renamed_function_params, clippy::rest_pat_in_fully_bound_structs, clippy::same_name_method, clippy::self_named_module_files, clippy::semicolon_inside_block, clippy::semicolon_outside_block, clippy::separated_literal_suffix, clippy::shadow_reuse, clippy::shadow_same, clippy::shadow_unrelated, clippy::single_call_fn, clippy::single_char_lifetime_names, clippy::std_instead_of_alloc, clippy::std_instead_of_core, clippy::str_to_string, clippy::string_add, clippy::string_lit_chars_any, clippy::string_slice, clippy::string_to_string, clippy::suspicious_xor_used_as_pow, clippy::tests_outside_test_module, clippy::todo, clippy::try_err, clippy::undocumented_unsafe_blocks, clippy::unimplemented, clippy::unnecessary_safety_comment, clippy::unnecessary_safety_doc, clippy::unnecessary_self_imports, clippy::unneeded_field_pattern, clippy::unreachable, clippy::unseparated_literal_suffix, clippy::unused_result_ok, clippy::unused_trait_names, clippy::unwrap_in_result, clippy::unwrap_used, clippy::use_debug, clippy::verbose_file_reads, clippy::wildcard_enum_match_arm"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::absolute_paths",
            "clippy::alloc_instead_of_core",
            "clippy::allow_attributes",
            "clippy::allow_attributes_without_reason",
            "clippy::arithmetic_side_effects",
            "clippy::as_conversions",
            "clippy::as_underscore",
            "clippy::assertions_on_result_states",
            "clippy::big_endian_bytes",
            "clippy::cfg_not_test",
            "clippy::clone_on_ref_ptr",
            "clippy::create_dir",
            "clippy::dbg_macro",
            "clippy::decimal_literal_representation",
            "clippy::default_numeric_fallback",
            "clippy::default_union_representation",
            "clippy::deref_by_slicing",
            "clippy::disallowed_script_idents",
            "clippy::else_if_without_else",
            "clippy::empty_drop",
            "clippy::empty_enum_variants_with_brackets",
            "clippy::empty_structs_with_brackets",
            "clippy::error_impl_error",
            "clippy::exhaustive_enums",
            "clippy::exhaustive_structs",
            "clippy::exit",
            "clippy::expect_used",
            "clippy::field_scoped_visibility_modifiers",
            "clippy::filetype_is_file",
            "clippy::float_arithmetic",
            "clippy::float_cmp_const",
            "clippy::fn_to_numeric_cast_any",
            "clippy::format_push_string",
            "clippy::get_unwrap",
            "clippy::host_endian_bytes",
            "clippy::if_then_some_else_none",
            "clippy::impl_trait_in_params",
            "clippy::implicit_return",
            "clippy::indexing_slicing",
            "clippy::infinite_loop",
            "clippy::inline_asm_x86_att_syntax",
            "clippy::inline_asm_x86_intel_syntax",
            "clippy::integer_division",
            "clippy::integer_division_remainder_used",
            "clippy::iter_over_hash_type",
            "clippy::large_include_file",
            "clippy::let_underscore_must_use",
            "clippy::let_underscore_untyped",
            "clippy::little_endian_bytes",
            "clippy::lossy_float_literal",
            "clippy::map_err_ignore",
            "clippy::mem_forget",
            "clippy::min_ident_chars",
            "clippy::missing_assert_message",
            "clippy::missing_asserts_for_indexing",
            "clippy::missing_docs_in_private_items",
            "clippy::missing_inline_in_public_items",
            "clippy::missing_trait_methods",
            "clippy::mixed_read_write_in_expression",
            "clippy::mod_module_files",
            "clippy::modulo_arithmetic",
            "clippy::multiple_inherent_impl",
            "clippy::multiple_unsafe_ops_per_block",
            "clippy::mutex_atomic",
            "clippy::needless_raw_strings",
            "clippy::non_ascii_literal",
            "clippy::non_zero_suggestions",
            "clippy::panic",
            "clippy::panic_in_result_fn",
            "clippy::partial_pub_fields",
            "clippy::pathbuf_init_then_push",
            "clippy::pattern_type_mismatch",
            "clippy::print_stderr",
            "clippy::print_stdout",
            "clippy::pub_use",
            "clippy::pub_with_shorthand",
            "clippy::pub_without_shorthand",
            "clippy::question_mark_used",
            "clippy::rc_buffer",
            "clippy::rc_mutex",
            "clippy::redundant_type_annotations",
            "clippy::ref_patterns",
            "clippy::renamed_function_params",
            "clippy::rest_pat_in_fully_bound_structs",
            "clippy::same_name_method",
            "clippy::self_named_module_files",
            "clippy::semicolon_inside_block",
            "clippy::semicolon_outside_block",
            "clippy::separated_literal_suffix",
            "clippy::shadow_reuse",
            "clippy::shadow_same",
            "clippy::shadow_unrelated",
            "clippy::single_call_fn",
            "clippy::single_char_lifetime_names",
            "clippy::std_instead_of_alloc",
            "clippy::std_instead_of_core",
            "clippy::str_to_string",
            "clippy::string_add",
            "clippy::string_lit_chars_any",
            "clippy::string_slice",
            "clippy::string_to_string",
            "clippy::suspicious_xor_used_as_pow",
            "clippy::tests_outside_test_module",
            "clippy::todo",
            "clippy::try_err",
            "clippy::undocumented_unsafe_blocks",
            "clippy::unimplemented",
            "clippy::unnecessary_safety_comment",
            "clippy::unnecessary_safety_doc",
            "clippy::unnecessary_self_imports",
            "clippy::unneeded_field_pattern",
            "clippy::unreachable",
            "clippy::unseparated_literal_suffix",
            "clippy::unused_result_ok",
            "clippy::unused_trait_names",
            "clippy::unwrap_in_result",
            "clippy::unwrap_used",
            "clippy::use_debug",
            "clippy::verbose_file_reads",
            "clippy::wildcard_enum_match_arm",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::style",
            description: r##"lint group for: clippy::assertions_on_constants, clippy::assign_op_pattern, clippy::blocks_in_conditions, clippy::bool_assert_comparison, clippy::borrow_interior_mutable_const, clippy::box_default, clippy::builtin_type_shadow, clippy::byte_char_slices, clippy::bytes_nth, clippy::chars_last_cmp, clippy::chars_next_cmp, clippy::cmp_null, clippy::collapsible_else_if, clippy::collapsible_if, clippy::collapsible_match, clippy::comparison_chain, clippy::comparison_to_empty, clippy::declare_interior_mutable_const, clippy::default_instead_of_iter_empty, clippy::disallowed_macros, clippy::disallowed_methods, clippy::disallowed_names, clippy::disallowed_types, clippy::doc_lazy_continuation, clippy::double_must_use, clippy::double_neg, clippy::duplicate_underscore_argument, clippy::enum_variant_names, clippy::err_expect, clippy::excessive_precision, clippy::field_reassign_with_default, clippy::filter_map_bool_then, clippy::fn_to_numeric_cast, clippy::fn_to_numeric_cast_with_truncation, clippy::for_kv_map, clippy::from_over_into, clippy::from_str_radix_10, clippy::get_first, clippy::if_same_then_else, clippy::implicit_saturating_add, clippy::implicit_saturating_sub, clippy::inconsistent_digit_grouping, clippy::infallible_destructuring_match, clippy::inherent_to_string, clippy::init_numbered_fields, clippy::into_iter_on_ref, clippy::is_digit_ascii_radix, clippy::items_after_test_module, clippy::iter_cloned_collect, clippy::iter_next_slice, clippy::iter_nth, clippy::iter_nth_zero, clippy::iter_skip_next, clippy::just_underscores_and_digits, clippy::legacy_numeric_constants, clippy::len_without_is_empty, clippy::len_zero, clippy::let_and_return, clippy::let_unit_value, clippy::main_recursion, clippy::manual_async_fn, clippy::manual_bits, clippy::manual_is_ascii_check, clippy::manual_is_finite, clippy::manual_is_infinite, clippy::manual_map, clippy::manual_next_back, clippy::manual_non_exhaustive, clippy::manual_pattern_char_comparison, clippy::manual_range_contains, clippy::manual_rotate, clippy::manual_saturating_arithmetic, clippy::manual_while_let_some, clippy::map_clone, clippy::map_collect_result_unit, clippy::match_like_matches_macro, clippy::match_overlapping_arm, clippy::match_ref_pats, clippy::match_result_ok, clippy::mem_replace_option_with_none, clippy::mem_replace_with_default, clippy::missing_enforced_import_renames, clippy::missing_safety_doc, clippy::mixed_attributes_style, clippy::mixed_case_hex_literals, clippy::module_inception, clippy::must_use_unit, clippy::mut_mutex_lock, clippy::needless_borrow, clippy::needless_borrows_for_generic_args, clippy::needless_doctest_main, clippy::needless_else, clippy::needless_late_init, clippy::needless_parens_on_range_literals, clippy::needless_pub_self, clippy::needless_range_loop, clippy::needless_return, clippy::needless_return_with_question_mark, clippy::neg_multiply, clippy::new_ret_no_self, clippy::new_without_default, clippy::non_minimal_cfg, clippy::obfuscated_if_else, clippy::ok_expect, clippy::op_ref, clippy::option_map_or_err_ok, clippy::option_map_or_none, clippy::partialeq_to_none, clippy::print_literal, clippy::print_with_newline, clippy::println_empty_string, clippy::ptr_arg, clippy::ptr_eq, clippy::question_mark, clippy::redundant_closure, clippy::redundant_field_names, clippy::redundant_pattern, clippy::redundant_pattern_matching, clippy::redundant_static_lifetimes, clippy::result_map_or_into_option, clippy::result_unit_err, clippy::same_item_push, clippy::self_named_constructors, clippy::should_implement_trait, clippy::single_char_add_str, clippy::single_component_path_imports, clippy::single_match, clippy::string_extend_chars, clippy::tabs_in_doc_comments, clippy::to_digit_is_some, clippy::to_string_trait_impl, clippy::too_long_first_doc_paragraph, clippy::toplevel_ref_arg, clippy::trim_split_whitespace, clippy::unnecessary_fallible_conversions, clippy::unnecessary_fold, clippy::unnecessary_lazy_evaluations, clippy::unnecessary_mut_passed, clippy::unnecessary_owned_empty_strings, clippy::unsafe_removed_from_name, clippy::unused_enumerate_index, clippy::unused_unit, clippy::unusual_byte_groupings, clippy::unwrap_or_default, clippy::upper_case_acronyms, clippy::while_let_on_iterator, clippy::write_literal, clippy::write_with_newline, clippy::writeln_empty_string, clippy::wrong_self_convention, clippy::zero_ptr"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::assertions_on_constants",
            "clippy::assign_op_pattern",
            "clippy::blocks_in_conditions",
            "clippy::bool_assert_comparison",
            "clippy::borrow_interior_mutable_const",
            "clippy::box_default",
            "clippy::builtin_type_shadow",
            "clippy::byte_char_slices",
            "clippy::bytes_nth",
            "clippy::chars_last_cmp",
            "clippy::chars_next_cmp",
            "clippy::cmp_null",
            "clippy::collapsible_else_if",
            "clippy::collapsible_if",
            "clippy::collapsible_match",
            "clippy::comparison_chain",
            "clippy::comparison_to_empty",
            "clippy::declare_interior_mutable_const",
            "clippy::default_instead_of_iter_empty",
            "clippy::disallowed_macros",
            "clippy::disallowed_methods",
            "clippy::disallowed_names",
            "clippy::disallowed_types",
            "clippy::doc_lazy_continuation",
            "clippy::double_must_use",
            "clippy::double_neg",
            "clippy::duplicate_underscore_argument",
            "clippy::enum_variant_names",
            "clippy::err_expect",
            "clippy::excessive_precision",
            "clippy::field_reassign_with_default",
            "clippy::filter_map_bool_then",
            "clippy::fn_to_numeric_cast",
            "clippy::fn_to_numeric_cast_with_truncation",
            "clippy::for_kv_map",
            "clippy::from_over_into",
            "clippy::from_str_radix_10",
            "clippy::get_first",
            "clippy::if_same_then_else",
            "clippy::implicit_saturating_add",
            "clippy::implicit_saturating_sub",
            "clippy::inconsistent_digit_grouping",
            "clippy::infallible_destructuring_match",
            "clippy::inherent_to_string",
            "clippy::init_numbered_fields",
            "clippy::into_iter_on_ref",
            "clippy::is_digit_ascii_radix",
            "clippy::items_after_test_module",
            "clippy::iter_cloned_collect",
            "clippy::iter_next_slice",
            "clippy::iter_nth",
            "clippy::iter_nth_zero",
            "clippy::iter_skip_next",
            "clippy::just_underscores_and_digits",
            "clippy::legacy_numeric_constants",
            "clippy::len_without_is_empty",
            "clippy::len_zero",
            "clippy::let_and_return",
            "clippy::let_unit_value",
            "clippy::main_recursion",
            "clippy::manual_async_fn",
            "clippy::manual_bits",
            "clippy::manual_is_ascii_check",
            "clippy::manual_is_finite",
            "clippy::manual_is_infinite",
            "clippy::manual_map",
            "clippy::manual_next_back",
            "clippy::manual_non_exhaustive",
            "clippy::manual_pattern_char_comparison",
            "clippy::manual_range_contains",
            "clippy::manual_rotate",
            "clippy::manual_saturating_arithmetic",
            "clippy::manual_while_let_some",
            "clippy::map_clone",
            "clippy::map_collect_result_unit",
            "clippy::match_like_matches_macro",
            "clippy::match_overlapping_arm",
            "clippy::match_ref_pats",
            "clippy::match_result_ok",
            "clippy::mem_replace_option_with_none",
            "clippy::mem_replace_with_default",
            "clippy::missing_enforced_import_renames",
            "clippy::missing_safety_doc",
            "clippy::mixed_attributes_style",
            "clippy::mixed_case_hex_literals",
            "clippy::module_inception",
            "clippy::must_use_unit",
            "clippy::mut_mutex_lock",
            "clippy::needless_borrow",
            "clippy::needless_borrows_for_generic_args",
            "clippy::needless_doctest_main",
            "clippy::needless_else",
            "clippy::needless_late_init",
            "clippy::needless_parens_on_range_literals",
            "clippy::needless_pub_self",
            "clippy::needless_range_loop",
            "clippy::needless_return",
            "clippy::needless_return_with_question_mark",
            "clippy::neg_multiply",
            "clippy::new_ret_no_self",
            "clippy::new_without_default",
            "clippy::non_minimal_cfg",
            "clippy::obfuscated_if_else",
            "clippy::ok_expect",
            "clippy::op_ref",
            "clippy::option_map_or_err_ok",
            "clippy::option_map_or_none",
            "clippy::partialeq_to_none",
            "clippy::print_literal",
            "clippy::print_with_newline",
            "clippy::println_empty_string",
            "clippy::ptr_arg",
            "clippy::ptr_eq",
            "clippy::question_mark",
            "clippy::redundant_closure",
            "clippy::redundant_field_names",
            "clippy::redundant_pattern",
            "clippy::redundant_pattern_matching",
            "clippy::redundant_static_lifetimes",
            "clippy::result_map_or_into_option",
            "clippy::result_unit_err",
            "clippy::same_item_push",
            "clippy::self_named_constructors",
            "clippy::should_implement_trait",
            "clippy::single_char_add_str",
            "clippy::single_component_path_imports",
            "clippy::single_match",
            "clippy::string_extend_chars",
            "clippy::tabs_in_doc_comments",
            "clippy::to_digit_is_some",
            "clippy::to_string_trait_impl",
            "clippy::too_long_first_doc_paragraph",
            "clippy::toplevel_ref_arg",
            "clippy::trim_split_whitespace",
            "clippy::unnecessary_fallible_conversions",
            "clippy::unnecessary_fold",
            "clippy::unnecessary_lazy_evaluations",
            "clippy::unnecessary_mut_passed",
            "clippy::unnecessary_owned_empty_strings",
            "clippy::unsafe_removed_from_name",
            "clippy::unused_enumerate_index",
            "clippy::unused_unit",
            "clippy::unusual_byte_groupings",
            "clippy::unwrap_or_default",
            "clippy::upper_case_acronyms",
            "clippy::while_let_on_iterator",
            "clippy::write_literal",
            "clippy::write_with_newline",
            "clippy::writeln_empty_string",
            "clippy::wrong_self_convention",
            "clippy::zero_ptr",
        ],
    },
    LintGroup {
        lint: Lint {
            label: "clippy::suspicious",
            description: r##"lint group for: clippy::almost_complete_range, clippy::arc_with_non_send_sync, clippy::await_holding_invalid_type, clippy::await_holding_lock, clippy::await_holding_refcell_ref, clippy::blanket_clippy_restriction_lints, clippy::cast_abs_to_unsigned, clippy::cast_enum_constructor, clippy::cast_enum_truncation, clippy::cast_nan_to_int, clippy::cast_slice_from_raw_parts, clippy::const_is_empty, clippy::crate_in_macro_def, clippy::deprecated_clippy_cfg_attr, clippy::drop_non_drop, clippy::duplicate_mod, clippy::duplicated_attributes, clippy::empty_docs, clippy::empty_line_after_doc_comments, clippy::empty_line_after_outer_attr, clippy::empty_loop, clippy::float_equality_without_abs, clippy::forget_non_drop, clippy::four_forward_slashes, clippy::from_raw_with_void_ptr, clippy::incompatible_msrv, clippy::ineffective_open_options, clippy::iter_out_of_bounds, clippy::join_absolute_paths, clippy::let_underscore_future, clippy::lines_filter_map_ok, clippy::macro_metavars_in_unsafe, clippy::manual_unwrap_or_default, clippy::misnamed_getters, clippy::misrefactored_assign_op, clippy::missing_transmute_annotations, clippy::multi_assignments, clippy::multiple_bound_locations, clippy::mut_range_bound, clippy::mutable_key_type, clippy::needless_character_iteration, clippy::needless_maybe_sized, clippy::no_effect_replace, clippy::non_canonical_clone_impl, clippy::non_canonical_partial_ord_impl, clippy::octal_escapes, clippy::path_ends_with_ext, clippy::permissions_set_readonly_false, clippy::pointers_in_nomem_asm_block, clippy::print_in_format_impl, clippy::rc_clone_in_vec_init, clippy::repeat_vec_with_capacity, clippy::single_range_in_vec_init, clippy::size_of_ref, clippy::suspicious_arithmetic_impl, clippy::suspicious_assignment_formatting, clippy::suspicious_command_arg_space, clippy::suspicious_doc_comments, clippy::suspicious_else_formatting, clippy::suspicious_map, clippy::suspicious_op_assign_impl, clippy::suspicious_open_options, clippy::suspicious_to_owned, clippy::suspicious_unary_op_formatting, clippy::swap_ptr_to_ref, clippy::test_attr_in_doctest, clippy::type_id_on_box, clippy::unconditional_recursion, clippy::unnecessary_clippy_cfg, clippy::unnecessary_get_then_check, clippy::unnecessary_result_map_or_else, clippy::zero_repeat_side_effects, clippy::zombie_processes"##,
            default_severity: Severity::Allow,
            warn_since: None,
            deny_since: None,
        },
        children: &[
            "clippy::almost_complete_range",
            "clippy::arc_with_non_send_sync",
            "clippy::await_holding_invalid_type",
            "clippy::await_holding_lock",
            "clippy::await_holding_refcell_ref",
            "clippy::blanket_clippy_restriction_lints",
            "clippy::cast_abs_to_unsigned",
            "clippy::cast_enum_constructor",
            "clippy::cast_enum_truncation",
            "clippy::cast_nan_to_int",
            "clippy::cast_slice_from_raw_parts",
            "clippy::const_is_empty",
            "clippy::crate_in_macro_def",
            "clippy::deprecated_clippy_cfg_attr",
            "clippy::drop_non_drop",
            "clippy::duplicate_mod",
            "clippy::duplicated_attributes",
            "clippy::empty_docs",
            "clippy::empty_line_after_doc_comments",
            "clippy::empty_line_after_outer_attr",
            "clippy::empty_loop",
            "clippy::float_equality_without_abs",
            "clippy::forget_non_drop",
            "clippy::four_forward_slashes",
            "clippy::from_raw_with_void_ptr",
            "clippy::incompatible_msrv",
            "clippy::ineffective_open_options",
            "clippy::iter_out_of_bounds",
            "clippy::join_absolute_paths",
            "clippy::let_underscore_future",
            "clippy::lines_filter_map_ok",
            "clippy::macro_metavars_in_unsafe",
            "clippy::manual_unwrap_or_default",
            "clippy::misnamed_getters",
            "clippy::misrefactored_assign_op",
            "clippy::missing_transmute_annotations",
            "clippy::multi_assignments",
            "clippy::multiple_bound_locations",
            "clippy::mut_range_bound",
            "clippy::mutable_key_type",
            "clippy::needless_character_iteration",
            "clippy::needless_maybe_sized",
            "clippy::no_effect_replace",
            "clippy::non_canonical_clone_impl",
            "clippy::non_canonical_partial_ord_impl",
            "clippy::octal_escapes",
            "clippy::path_ends_with_ext",
            "clippy::permissions_set_readonly_false",
            "clippy::pointers_in_nomem_asm_block",
            "clippy::print_in_format_impl",
            "clippy::rc_clone_in_vec_init",
            "clippy::repeat_vec_with_capacity",
            "clippy::single_range_in_vec_init",
            "clippy::size_of_ref",
            "clippy::suspicious_arithmetic_impl",
            "clippy::suspicious_assignment_formatting",
            "clippy::suspicious_command_arg_space",
            "clippy::suspicious_doc_comments",
            "clippy::suspicious_else_formatting",
            "clippy::suspicious_map",
            "clippy::suspicious_op_assign_impl",
            "clippy::suspicious_open_options",
            "clippy::suspicious_to_owned",
            "clippy::suspicious_unary_op_formatting",
            "clippy::swap_ptr_to_ref",
            "clippy::test_attr_in_doctest",
            "clippy::type_id_on_box",
            "clippy::unconditional_recursion",
            "clippy::unnecessary_clippy_cfg",
            "clippy::unnecessary_get_then_check",
            "clippy::unnecessary_result_map_or_else",
            "clippy::zero_repeat_side_effects",
            "clippy::zombie_processes",
        ],
    },
];