[INFO] fetching crate serde_yaml_with_quirks 0.9.34... [INFO] checking serde_yaml_with_quirks-0.9.34 against master#cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c for pr-143170 [INFO] extracting crate serde_yaml_with_quirks 0.9.34 into /workspace/builds/worker-2-tc1/source [INFO] started tweaking crates.io crate serde_yaml_with_quirks 0.9.34 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate serde_yaml_with_quirks 0.9.34 [INFO] tweaked toml for crates.io crate serde_yaml_with_quirks 0.9.34 written to /workspace/builds/worker-2-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate serde_yaml_with_quirks 0.9.34 on toolchain cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate serde_yaml_with_quirks 0.9.34 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] da80eb144f89de7cd9623d6ab05b6a69029f8319639aa6b0ca11cf53acf6186e [INFO] running `Command { std: "docker" "start" "-a" "da80eb144f89de7cd9623d6ab05b6a69029f8319639aa6b0ca11cf53acf6186e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "da80eb144f89de7cd9623d6ab05b6a69029f8319639aa6b0ca11cf53acf6186e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "da80eb144f89de7cd9623d6ab05b6a69029f8319639aa6b0ca11cf53acf6186e", kill_on_drop: false }` [INFO] [stdout] da80eb144f89de7cd9623d6ab05b6a69029f8319639aa6b0ca11cf53acf6186e [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+cf38b8e663f15db10ce49d7bbce02c99fc3dbc0c" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 48054321d0f0dfa957bae4f1648234fdf3fe0110446e2643e8ed277cd2a8f6d1 [INFO] running `Command { std: "docker" "start" "-a" "48054321d0f0dfa957bae4f1648234fdf3fe0110446e2643e8ed277cd2a8f6d1", kill_on_drop: false }` [INFO] [stderr] Checking equivalent v1.0.2 [INFO] [stderr] Compiling anyhow v1.0.98 [INFO] [stderr] Checking hashbrown v0.15.3 [INFO] [stderr] Checking unsafe-libyaml v0.2.11 [INFO] [stderr] Compiling indoc v2.0.6 [INFO] [stderr] Compiling syn v2.0.101 [INFO] [stderr] Checking indexmap v2.9.0 [INFO] [stderr] Checking serde_yaml_with_quirks v0.9.34 (/opt/rustwide/workdir) [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:21:28 [INFO] [stdout] | [INFO] [stdout] 21 | kind: unsafe { (*parser).error }, [INFO] [stdout] | ^^------^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] = note: `#[deny(dangerous_implicit_autorefs)]` on by default [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 21 | kind: unsafe { (&(*parser)).error }, [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:22:50 [INFO] [stdout] | [INFO] [stdout] 22 | problem: match NonNull::new(unsafe { (*parser).problem as *mut _ }) { [INFO] [stdout] | ^^------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 22 | problem: match NonNull::new(unsafe { (&(*parser)).problem as *mut _ }) { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:26:38 [INFO] [stdout] | [INFO] [stdout] 26 | problem_offset: unsafe { (*parser).problem_offset }, [INFO] [stdout] | ^^------^^^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 26 | problem_offset: unsafe { (&(*parser)).problem_offset }, [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:28:31 [INFO] [stdout] | [INFO] [stdout] 28 | sys: unsafe { (*parser).problem_mark }, [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 28 | sys: unsafe { (&(*parser)).problem_mark }, [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:30:50 [INFO] [stdout] | [INFO] [stdout] 30 | context: match NonNull::new(unsafe { (*parser).context as *mut _ }) { [INFO] [stdout] | ^^------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 30 | context: match NonNull::new(unsafe { (&(*parser)).context as *mut _ }) { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:35:31 [INFO] [stdout] | [INFO] [stdout] 35 | sys: unsafe { (*parser).context_mark }, [INFO] [stdout] | ^^------^^^^^^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 35 | sys: unsafe { (&(*parser)).context_mark }, [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:42:28 [INFO] [stdout] | [INFO] [stdout] 42 | kind: unsafe { (*emitter).error }, [INFO] [stdout] | ^^-------^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_emitter_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 42 | kind: unsafe { (&(*emitter)).error }, [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/error.rs:43:50 [INFO] [stdout] | [INFO] [stdout] 43 | problem: match NonNull::new(unsafe { (*emitter).problem as *mut _ }) { [INFO] [stdout] | ^^-------^^^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*const yaml_emitter_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 43 | problem: match NonNull::new(unsafe { (&(*emitter)).problem as *mut _ }) { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer [INFO] [stdout] --> src/libyaml/parser.rs:87:16 [INFO] [stdout] | [INFO] [stdout] 87 | if (*parser).error != sys::YAML_NO_ERROR { [INFO] [stdout] | ^^------^^^^^^^ [INFO] [stdout] | | [INFO] [stdout] | this raw pointer has type `*mut yaml_parser_t` [INFO] [stdout] | [INFO] [stdout] = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements [INFO] [stdout] = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations [INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit [INFO] [stdout] | [INFO] [stdout] 87 | if (&(*parser)).error != sys::YAML_NO_ERROR { [INFO] [stdout] | ++ + [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:81:18 [INFO] [stdout] | [INFO] [stdout] 81 | pub fn entry(&mut self, k: Value) -> Entry { [INFO] [stdout] | ^^^^^^^^^ ----- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 81 | pub fn entry(&mut self, k: Value) -> Entry<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:188:17 [INFO] [stdout] | [INFO] [stdout] 188 | pub fn iter(&self) -> Iter { [INFO] [stdout] | ^^^^^ ---- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 188 | pub fn iter(&self) -> Iter<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:197:21 [INFO] [stdout] | [INFO] [stdout] 197 | pub fn iter_mut(&mut self) -> IterMut { [INFO] [stdout] | ^^^^^^^^^ ------- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 197 | pub fn iter_mut(&mut self) -> IterMut<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:204:17 [INFO] [stdout] | [INFO] [stdout] 204 | pub fn keys(&self) -> Keys { [INFO] [stdout] | ^^^^^ ---- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 204 | pub fn keys(&self) -> Keys<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:218:19 [INFO] [stdout] | [INFO] [stdout] 218 | pub fn values(&self) -> Values { [INFO] [stdout] | ^^^^^ ------ the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 218 | pub fn values(&self) -> Values<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/mapping.rs:225:23 [INFO] [stdout] | [INFO] [stdout] 225 | pub fn values_mut(&mut self) -> ValuesMut { [INFO] [stdout] | ^^^^^^^^^ --------- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 225 | pub fn values_mut(&mut self) -> ValuesMut<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/number.rs:565:34 [INFO] [stdout] | [INFO] [stdout] 565 | pub(crate) fn unexpected(number: &Number) -> Unexpected { [INFO] [stdout] | ^^^^^^^ ---------- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 565 | pub(crate) fn unexpected(number: &Number) -> Unexpected<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lifetime flowing from input to output with different syntax can be confusing [INFO] [stdout] --> src/value/de.rs:1231:30 [INFO] [stdout] | [INFO] [stdout] 1231 | pub(crate) fn unexpected(&self) -> Unexpected { [INFO] [stdout] | ^^^^^ ---------- the lifetime gets resolved as `'_` [INFO] [stdout] | | [INFO] [stdout] | this lifetime flows to the output [INFO] [stdout] | [INFO] [stdout] help: one option is to remove the lifetime for references and use the anonymous lifetime for paths [INFO] [stdout] | [INFO] [stdout] 1231 | pub(crate) fn unexpected(&self) -> Unexpected<'_> { [INFO] [stdout] | ++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling serde_derive v1.0.219 [INFO] [stderr] error: could not compile `serde_yaml_with_quirks` (lib) due to 9 previous errors; 8 warnings emitted [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] running `Command { std: "docker" "inspect" "48054321d0f0dfa957bae4f1648234fdf3fe0110446e2643e8ed277cd2a8f6d1", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "48054321d0f0dfa957bae4f1648234fdf3fe0110446e2643e8ed277cd2a8f6d1", kill_on_drop: false }` [INFO] [stdout] 48054321d0f0dfa957bae4f1648234fdf3fe0110446e2643e8ed277cd2a8f6d1