[INFO] fetching crate mqttrust_core 0.6.0...
[INFO] checking mqttrust_core-0.6.0 against master#5a45ab9738330fb317d49e3594c2db5248b1e971 for pr-136303
[INFO] extracting crate mqttrust_core 0.6.0 into /workspace/builds/worker-1-tc1/source
[INFO] validating manifest of crates.io crate mqttrust_core 0.6.0 on toolchain 5a45ab9738330fb317d49e3594c2db5248b1e971
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5a45ab9738330fb317d49e3594c2db5248b1e971" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate mqttrust_core 0.6.0
[INFO] removed 0 missing examples
[INFO] finished tweaking crates.io crate mqttrust_core 0.6.0
[INFO] tweaked toml for crates.io crate mqttrust_core 0.6.0 written to /workspace/builds/worker-1-tc1/source/Cargo.toml
[INFO] crate crates.io crate mqttrust_core 0.6.0 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5a45ab9738330fb317d49e3594c2db5248b1e971" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded defmt-macros v0.3.2
[INFO] [stderr]   Downloaded embedded-nal v0.6.0
[INFO] [stderr]   Downloaded mqttrust v0.6.0
[INFO] [stderr]   Downloaded fugit v0.3.6
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:c80049f3b88b82089a44e0f06d0d6029d44b96b7257e55a1cd63dbc9f4c33334" "/opt/rustwide/cargo-home/bin/cargo" "+5a45ab9738330fb317d49e3594c2db5248b1e971" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 61015e8bde2c77f440f68515e345bc34315fdb4c25bca18205056edadd35175d
[INFO] running `Command { std: "docker" "start" "-a" "61015e8bde2c77f440f68515e345bc34315fdb4c25bca18205056edadd35175d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "61015e8bde2c77f440f68515e345bc34315fdb4c25bca18205056edadd35175d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "61015e8bde2c77f440f68515e345bc34315fdb4c25bca18205056edadd35175d", kill_on_drop: false }`
[INFO] [stdout] 61015e8bde2c77f440f68515e345bc34315fdb4c25bca18205056edadd35175d
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:c80049f3b88b82089a44e0f06d0d6029d44b96b7257e55a1cd63dbc9f4c33334" "/opt/rustwide/cargo-home/bin/cargo" "+5a45ab9738330fb317d49e3594c2db5248b1e971" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 96b2e85dbe40f2f7030b9788ad219e9fa7e9afc4bdbe8164cb08fb8e519075a5
[INFO] running `Command { std: "docker" "start" "-a" "96b2e85dbe40f2f7030b9788ad219e9fa7e9afc4bdbe8164cb08fb8e519075a5", kill_on_drop: false }`
[INFO] [stderr]    Compiling autocfg v1.1.0
[INFO] [stderr]    Compiling semver v1.0.14
[INFO] [stderr]    Compiling libc v0.2.133
[INFO] [stderr]    Compiling proc-macro2 v1.0.43
[INFO] [stderr]    Compiling pkg-config v0.3.25
[INFO] [stderr]    Compiling cc v1.0.73
[INFO] [stderr]     Checking scopeguard v1.1.0
[INFO] [stderr]    Compiling serde v1.0.144
[INFO] [stderr]    Compiling unicode-ident v1.0.4
[INFO] [stderr]    Compiling quote v1.0.21
[INFO] [stderr]     Checking cfg-if v1.0.0
[INFO] [stderr]     Checking byteorder v1.4.3
[INFO] [stderr]    Compiling memchr v2.5.0
[INFO] [stderr]    Compiling lock_api v0.4.9
[INFO] [stderr]    Compiling rustc_version v0.4.0
[INFO] [stderr]    Compiling syn v1.0.100
[INFO] [stderr]     Checking hash32 v0.2.1
[INFO] [stderr]     Checking spin v0.9.4
[INFO] [stderr]    Compiling heapless v0.7.16
[INFO] [stderr]    Compiling paste v1.0.9
[INFO] [stderr]     Checking nb v1.0.0
[INFO] [stderr]    Compiling openssl-sys v0.9.75
[INFO] [stderr]    Compiling log v0.4.17
[INFO] [stderr]     Checking stable_deref_trait v1.2.0
[INFO] [stderr]    Compiling openssl v0.10.41
[INFO] [stderr]     Checking foreign-types-shared v0.1.1
[INFO] [stderr]     Checking foreign-types v0.3.2
[INFO] [stderr]    Compiling native-tls v0.2.10
[INFO] [stderr]     Checking once_cell v1.15.0
[INFO] [stderr]     Checking aho-corasick v0.7.19
[INFO] [stderr]     Checking no-std-net v0.5.0
[INFO] [stderr]     Checking regex-syntax v0.6.27
[INFO] [stderr]     Checking bitflags v1.3.2
[INFO] [stderr]     Checking socket2 v0.4.7
[INFO] [stderr]     Checking gcd v2.1.0
[INFO] [stderr]     Checking atty v0.2.14
[INFO] [stderr]     Checking fugit v0.3.6
[INFO] [stderr]     Checking openssl-probe v0.1.5
[INFO] [stderr]     Checking termcolor v1.1.3
[INFO] [stderr]     Checking bbqueue v0.5.1
[INFO] [stderr]     Checking fugit-timer v0.1.3
[INFO] [stderr]     Checking humantime v2.1.0
[INFO] [stderr]     Checking dns-lookup v1.0.8
[INFO] [stderr]     Checking embedded-hal v1.0.0-alpha.8
[INFO] [stderr]     Checking embedded-nal v0.6.0
[INFO] [stderr]     Checking mqttrust v0.6.0
[INFO] [stderr]     Checking regex v1.6.0
[INFO] [stderr]     Checking mqttrust_core v0.6.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: method `into_result` is never used
[INFO] [stdout]    --> src/fmt.rs:226:8
[INFO] [stdout]     |
[INFO] [stdout] 223 | pub trait Try {
[INFO] [stdout]     |           --- method in this trait
[INFO] [stdout] ...
[INFO] [stdout] 226 |     fn into_result(self) -> Result<Self::Ok, Self::Error>;
[INFO] [stdout]     |        ^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/state.rs:84:41
[INFO] [stdout]    |
[INFO] [stdout] 84 |             BoxedPublish::grow(unsafe { &mut PUBLISH_MEM });
[INFO] [stdout]    |                                         ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 84 |             BoxedPublish::grow(unsafe { &raw mut PUBLISH_MEM });
[INFO] [stdout]    |                                         ~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking env_logger v0.9.1
[INFO] [stderr]    Compiling openssl-macros v0.1.0
[INFO] [stdout] warning: method `into_result` is never used
[INFO] [stdout]    --> src/fmt.rs:226:8
[INFO] [stdout]     |
[INFO] [stdout] 223 | pub trait Try {
[INFO] [stdout]     |           --- method in this trait
[INFO] [stdout] ...
[INFO] [stdout] 226 |     fn into_result(self) -> Result<Self::Ok, Self::Error>;
[INFO] [stdout]     |        ^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> src/eventloop.rs:670:37
[INFO] [stdout]     |
[INFO] [stdout] 670 |         BoxedPublish::grow(unsafe { &mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 670 |         BoxedPublish::grow(unsafe { &raw mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> src/eventloop.rs:719:37
[INFO] [stdout]     |
[INFO] [stdout] 719 |         BoxedPublish::grow(unsafe { &mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 719 |         BoxedPublish::grow(unsafe { &raw mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static is discouraged
[INFO] [stdout]    --> src/eventloop.rs:769:32
[INFO] [stdout]     |
[INFO] [stdout] 769 |         let (_p, c) = unsafe { Q.try_split_framed().unwrap() };
[INFO] [stdout]     |                                ^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/state.rs:84:41
[INFO] [stdout]    |
[INFO] [stdout] 84 |             BoxedPublish::grow(unsafe { &mut PUBLISH_MEM });
[INFO] [stdout]    |                                         ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 84 |             BoxedPublish::grow(unsafe { &raw mut PUBLISH_MEM });
[INFO] [stdout]    |                                         ~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> src/state.rs:517:37
[INFO] [stdout]     |
[INFO] [stdout] 517 |         BoxedPublish::grow(unsafe { &mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 517 |         BoxedPublish::grow(unsafe { &raw mut PUBLISH_MEM });
[INFO] [stdout]     |                                     ~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 14.96s
[INFO] running `Command { std: "docker" "inspect" "96b2e85dbe40f2f7030b9788ad219e9fa7e9afc4bdbe8164cb08fb8e519075a5", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "96b2e85dbe40f2f7030b9788ad219e9fa7e9afc4bdbe8164cb08fb8e519075a5", kill_on_drop: false }`
[INFO] [stdout] 96b2e85dbe40f2f7030b9788ad219e9fa7e9afc4bdbe8164cb08fb8e519075a5
