[INFO] fetching crate indexing 0.4.1...
[INFO] testing indexing-0.4.1 against master#c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38 for pr-146098-7
[INFO] extracting crate indexing 0.4.1 into /workspace/builds/worker-0-tc1/source
[INFO] started tweaking crates.io crate indexing 0.4.1
[INFO] finished tweaking crates.io crate indexing 0.4.1
[INFO] tweaked toml for crates.io crate indexing 0.4.1 written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] validating manifest of crates.io crate indexing 0.4.1 on toolchain c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]      Locking 74 packages to latest compatible versions
[INFO] [stderr]       Adding compiletest_rs v0.3.26 (available: v0.11.2)
[INFO] [stderr]       Adding quickcheck v0.9.2 (available: v1.0.3)
[INFO] [stderr]       Adding rand v0.7.3 (available: v0.9.2)
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded getopts v0.2.24
[INFO] [stderr]   Downloaded dirs v2.0.2
[INFO] [stderr]   Downloaded compiletest_rs v0.3.26
[INFO] [stderr]   Downloaded tester v0.6.0
[INFO] [stderr]   Downloaded rustfix v0.4.6
[INFO] [stderr]   Downloaded term v0.6.1
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 54d646821b886177a8c9b4f09411e038c22f7b53245dfe73abc3d203623d69bc
[INFO] running `Command { std: "docker" "start" "-a" "54d646821b886177a8c9b4f09411e038c22f7b53245dfe73abc3d203623d69bc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "54d646821b886177a8c9b4f09411e038c22f7b53245dfe73abc3d203623d69bc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "54d646821b886177a8c9b4f09411e038c22f7b53245dfe73abc3d203623d69bc", kill_on_drop: false }`
[INFO] [stdout] 54d646821b886177a8c9b4f09411e038c22f7b53245dfe73abc3d203623d69bc
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4848fb76d95f26979359cc7e45710b1dbc8f3acb7aeedee7c460d7702230f228" "/opt/rustwide/cargo-home/bin/cargo" "+c90bcb9571b7aab0d8beaa2ce8a998ffaf079d38" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 568407c7f9cc5c1bb440a681d67eaf86d8057604cc8c05b0d5364e8d1230c4e9
[INFO] running `Command { std: "docker" "start" "-a" "568407c7f9cc5c1bb440a681d67eaf86d8057604cc8c05b0d5364e8d1230c4e9", kill_on_drop: false }`
[INFO] [stderr]    Compiling indexing v0.4.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: field `id` is never read
[INFO] [stdout]    --> src/lib.rs:162:5
[INFO] [stdout]     |
[INFO] [stdout] 161 | pub struct Index<'id, Proof = NonEmpty> {
[INFO] [stdout]     |            ----- field in this struct
[INFO] [stdout] 162 |     id: Id<'id>,
[INFO] [stdout]     |     ^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: trait `ContainerPrivate` is never used
[INFO] [stdout]    --> src/lib.rs:241:7
[INFO] [stdout]     |
[INFO] [stdout] 241 | trait ContainerPrivate {
[INFO] [stdout]     |       ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `id` is never read
[INFO] [stdout]    --> src/indexing.rs:465:5
[INFO] [stdout]     |
[INFO] [stdout] 464 | pub struct RangeIter<'id> {
[INFO] [stdout]     |            --------- field in this struct
[INFO] [stdout] 465 |     id: Id<'id>,
[INFO] [stdout]     |     ^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `RangeIter` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: trait `PointerExt` is never used
[INFO] [stdout]   --> src/pointer_ext.rs:11:11
[INFO] [stdout]    |
[INFO] [stdout] 11 | pub trait PointerExt : Copy {
[INFO] [stdout]    |           ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/container.rs:324:35
[INFO] [stdout]     |
[INFO] [stdout] 324 |             let pi: *mut _ = &mut (*self_mut)[i];
[INFO] [stdout]     |                                   ^^--------^^^^
[INFO] [stdout]     |                                     |
[INFO] [stdout]     |                                     this raw pointer has type `*mut Container<'_, Array, Mode>`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&mut Container<'_, Array, Mode>`
[INFO] [stdout]    --> src/container.rs:324:35
[INFO] [stdout]     |
[INFO] [stdout] 324 |             let pi: *mut _ = &mut (*self_mut)[i];
[INFO] [stdout]     |                                   ^^^^^^^^^^^
[INFO] [stdout]     = note: `#[deny(dangerous_implicit_autorefs)]` on by default
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 324 |             let pi: *mut _ = &mut (&mut (*self_mut))[i];
[INFO] [stdout]     |                                   +++++            +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/container.rs:325:35
[INFO] [stdout]     |
[INFO] [stdout] 325 |             let pj: *mut _ = &mut (*self_mut)[j];
[INFO] [stdout]     |                                   ^^--------^^^^
[INFO] [stdout]     |                                     |
[INFO] [stdout]     |                                     this raw pointer has type `*mut Container<'_, Array, Mode>`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&mut Container<'_, Array, Mode>`
[INFO] [stdout]    --> src/container.rs:325:35
[INFO] [stdout]     |
[INFO] [stdout] 325 |             let pj: *mut _ = &mut (*self_mut)[j];
[INFO] [stdout]     |                                   ^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 325 |             let pj: *mut _ = &mut (&mut (*self_mut))[j];
[INFO] [stdout]     |                                   +++++            +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/container.rs:383:26
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (*self_mut)[r], &mut (*self_mut)[s]))
[INFO] [stdout]     |                          ^^--------^^^^
[INFO] [stdout]     |                            |
[INFO] [stdout]     |                            this raw pointer has type `*mut Container<'_, Array, Mode>`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&mut Container<'_, Array, Mode>`
[INFO] [stdout]    --> src/container.rs:383:26
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (*self_mut)[r], &mut (*self_mut)[s]))
[INFO] [stdout]     |                          ^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (&mut (*self_mut))[r], &mut (*self_mut)[s]))
[INFO] [stdout]     |                          +++++            +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: implicit autoref creates a reference to the dereference of a raw pointer
[INFO] [stdout]    --> src/container.rs:383:47
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (*self_mut)[r], &mut (*self_mut)[s]))
[INFO] [stdout]     |                                               ^^--------^^^^
[INFO] [stdout]     |                                                 |
[INFO] [stdout]     |                                                 this raw pointer has type `*mut Container<'_, Array, Mode>`
[INFO] [stdout]     |
[INFO] [stdout]     = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements
[INFO] [stdout] note: autoref is being applied to this expression, resulting in: `&mut Container<'_, Array, Mode>`
[INFO] [stdout]    --> src/container.rs:383:47
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (*self_mut)[r], &mut (*self_mut)[s]))
[INFO] [stdout]     |                                               ^^^^^^^^^^^
[INFO] [stdout] help: try using a raw pointer method instead; or if this reference is intentional, make it explicit
[INFO] [stdout]     |
[INFO] [stdout] 383 |                 Ok((&mut (*self_mut)[r], &mut (&mut (*self_mut))[s]))
[INFO] [stdout]     |                                               +++++            +
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `indexing` (lib) due to 4 previous errors; 4 warnings emitted
[INFO] running `Command { std: "docker" "inspect" "568407c7f9cc5c1bb440a681d67eaf86d8057604cc8c05b0d5364e8d1230c4e9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "568407c7f9cc5c1bb440a681d67eaf86d8057604cc8c05b0d5364e8d1230c4e9", kill_on_drop: false }`
[INFO] [stdout] 568407c7f9cc5c1bb440a681d67eaf86d8057604cc8c05b0d5364e8d1230c4e9
