[INFO] fetching crate da14582-pac 0.2.0... [INFO] checking da14582-pac-0.2.0 against try#a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d for pr-145342-1 [INFO] extracting crate da14582-pac 0.2.0 into /workspace/builds/worker-1-tc2/source [INFO] started tweaking crates.io crate da14582-pac 0.2.0 [INFO] finished tweaking crates.io crate da14582-pac 0.2.0 [INFO] tweaked toml for crates.io crate da14582-pac 0.2.0 written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] validating manifest of crates.io crate da14582-pac 0.2.0 on toolchain a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate da14582-pac 0.2.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 3475f1ef78153821a3e7e3cf85ee3e5c19f1ed428b9fe83fb2f9f3d07b2358e7 [INFO] running `Command { std: "docker" "start" "-a" "3475f1ef78153821a3e7e3cf85ee3e5c19f1ed428b9fe83fb2f9f3d07b2358e7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "3475f1ef78153821a3e7e3cf85ee3e5c19f1ed428b9fe83fb2f9f3d07b2358e7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3475f1ef78153821a3e7e3cf85ee3e5c19f1ed428b9fe83fb2f9f3d07b2358e7", kill_on_drop: false }` [INFO] [stdout] 3475f1ef78153821a3e7e3cf85ee3e5c19f1ed428b9fe83fb2f9f3d07b2358e7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:7ad1b28ee6f5f7f699f6cf7015098d6ccdd96d6f2d78dd06228f5b4c9faf309c" "/opt/rustwide/cargo-home/bin/cargo" "+a4980311fb7bb9e7893708e6bd3fbbfb2819fd3d" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 430376664c2cf6890f31cdcf99135a7e910cba83d831f0ae4b1f8a0dbe10e73b [INFO] running `Command { std: "docker" "start" "-a" "430376664c2cf6890f31cdcf99135a7e910cba83d831f0ae4b1f8a0dbe10e73b", kill_on_drop: false }` [INFO] [stderr] Compiling semver-parser v0.7.0 [INFO] [stderr] Checking nb v1.1.0 [INFO] [stderr] Compiling cortex-m v0.7.7 [INFO] [stderr] Checking vcell v0.1.3 [INFO] [stderr] Checking void v1.0.2 [INFO] [stderr] Compiling da14582-pac v0.2.0 (/opt/rustwide/workdir) [INFO] [stderr] Checking bitfield v0.13.2 [INFO] [stderr] Checking volatile-register v0.2.2 [INFO] [stderr] Checking nb v0.1.3 [INFO] [stderr] Checking embedded-hal v0.2.7 [INFO] [stderr] Compiling semver v0.9.0 [INFO] [stderr] Compiling rustc_version v0.2.3 [INFO] [stderr] Compiling bare-metal v0.2.5 [INFO] [stdout] warning[E0133]: call to unsafe function `core::ptr::mut_ptr::::read_volatile` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:309:19 [INFO] [stdout] | [INFO] [stdout] 309 | let val = self.ptr().read_volatile(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:292:5 [INFO] [stdout] | [INFO] [stdout] 292 | pub unsafe fn read(&self) -> RegValueT { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] = note: `#[warn(unsafe_op_in_unsafe_fn)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::ptr::mut_ptr::::write_volatile` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:361:9 [INFO] [stdout] | [INFO] [stdout] 361 | self.ptr().write_volatile(reg_value.data); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:346:5 [INFO] [stdout] | [INFO] [stdout] 346 | pub unsafe fn write(&self, reg_value: RegValueT) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::ptr::mut_ptr::::write_volatile` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:401:9 [INFO] [stdout] | [INFO] [stdout] 401 | self.ptr().write_volatile(value); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:386:5 [INFO] [stdout] | [INFO] [stdout] 386 | pub unsafe fn write_raw(&self, value: T::DataType) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `common::Reg::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:433:9 [INFO] [stdout] | [INFO] [stdout] 433 | self.write(res); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:430:5 [INFO] [stdout] | [INFO] [stdout] 430 | pub unsafe fn init(&self, f: impl FnOnce(RegValueT) -> RegValueT) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `common::Reg::::read` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:462:19 [INFO] [stdout] | [INFO] [stdout] 462 | let val = self.read(); [INFO] [stdout] | ^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:461:5 [INFO] [stdout] | [INFO] [stdout] 461 | pub unsafe fn modify(&self, f: impl FnOnce(RegValueT) -> RegValueT) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `common::Reg::::write` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:464:9 [INFO] [stdout] | [INFO] [stdout] 464 | self.write(res); [INFO] [stdout] | ^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:796:10 [INFO] [stdout] | [INFO] [stdout] 796 | &*(self.as_ptr().add(index * DIM_INCREMENT) as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:795:5 [INFO] [stdout] | [INFO] [stdout] 795 | pub const unsafe fn get_unchecked(&self, index: usize) -> &T { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: call to unsafe function `core::ptr::mut_ptr::::add` is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:796:12 [INFO] [stdout] | [INFO] [stdout] 796 | &*(self.as_ptr().add(index * DIM_INCREMENT) as *const _) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ call to unsafe function [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: consult the function's documentation for information on how to avoid undefined behavior [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning[E0133]: dereference of raw pointer is unsafe and requires unsafe block [INFO] [stdout] --> src/common.rs:802:10 [INFO] [stdout] | [INFO] [stdout] 802 | &*(ptr as *const Self) [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^ dereference of raw pointer [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: raw pointers may be null, dangling or unaligned; they can violate aliasing rules and cause data races: all of these are undefined behavior [INFO] [stdout] note: an unsafe function restricts its caller, but its body is safe by default [INFO] [stdout] --> src/common.rs:801:5 [INFO] [stdout] | [INFO] [stdout] 801 | pub(crate) const unsafe fn from_ptr(ptr: *mut u8) -> &'static Self { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0133`. [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.99s [INFO] running `Command { std: "docker" "inspect" "430376664c2cf6890f31cdcf99135a7e910cba83d831f0ae4b1f8a0dbe10e73b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "430376664c2cf6890f31cdcf99135a7e910cba83d831f0ae4b1f8a0dbe10e73b", kill_on_drop: false }` [INFO] [stdout] 430376664c2cf6890f31cdcf99135a7e910cba83d831f0ae4b1f8a0dbe10e73b