[INFO] fetching crate gurobi 0.3.4... [INFO] documenting gurobi-0.3.4 against master#8afe9ff1caa97654c31fb8c259dac9fdf67d6302 for pr-151918 [INFO] extracting crate gurobi 0.3.4 into /workspace/builds/worker-3-tc1/source [INFO] started tweaking crates.io crate gurobi 0.3.4 [INFO] finished tweaking crates.io crate gurobi 0.3.4 [INFO] tweaked toml for crates.io crate gurobi 0.3.4 written to /workspace/builds/worker-3-tc1/source/Cargo.toml [INFO] validating manifest of crates.io crate gurobi 0.3.4 on toolchain 8afe9ff1caa97654c31fb8c259dac9fdf67d6302 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8afe9ff1caa97654c31fb8c259dac9fdf67d6302" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate crates.io crate gurobi 0.3.4 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8afe9ff1caa97654c31fb8c259dac9fdf67d6302" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2024 [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded gurobi-sys v0.3.0 [INFO] [stderr] Downloaded itertools v0.4.19 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:29356a839a4d14451438f794ce8414e707d72405f44418718d724d22562fe786" "/opt/rustwide/cargo-home/bin/cargo" "+8afe9ff1caa97654c31fb8c259dac9fdf67d6302" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] d7b23486a41bc3235579691535c93eb76b64f090d3c334350dae3bbbe17c83f8 [INFO] running `Command { std: "docker" "start" "-a" "d7b23486a41bc3235579691535c93eb76b64f090d3c334350dae3bbbe17c83f8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "d7b23486a41bc3235579691535c93eb76b64f090d3c334350dae3bbbe17c83f8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d7b23486a41bc3235579691535c93eb76b64f090d3c334350dae3bbbe17c83f8", kill_on_drop: false }` [INFO] [stdout] d7b23486a41bc3235579691535c93eb76b64f090d3c334350dae3bbbe17c83f8 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:29356a839a4d14451438f794ce8414e707d72405f44418718d724d22562fe786" "/opt/rustwide/cargo-home/bin/cargo" "+8afe9ff1caa97654c31fb8c259dac9fdf67d6302" "doc" "--frozen" "--no-deps" "--document-private-items" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 5b63d5c2e564375228850690b3dbcd3cf1c292a97905ca9d82c04f7ba6d5e552 [INFO] running `Command { std: "docker" "start" "-a" "5b63d5c2e564375228850690b3dbcd3cf1c292a97905ca9d82c04f7ba6d5e552", kill_on_drop: false }` [INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2024 [INFO] [stderr] Compiling gurobi-sys v0.3.0 [INFO] [stderr] Checking itertools v0.4.19 [INFO] [stderr] Documenting gurobi v0.3.4 (/opt/rustwide/workdir) [INFO] [stdout] warning: unknown lint: `extend_from_slice` [INFO] [stdout] --> src/lib.rs:80:10 [INFO] [stdout] | [INFO] [stdout] 80 | #![allow(extend_from_slice)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `explicit_iter_loop` [INFO] [stdout] --> src/lib.rs:81:10 [INFO] [stdout] | [INFO] [stdout] 81 | #![allow(explicit_iter_loop)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `clippy` [INFO] [stdout] --> src/lib.rs:78:13 [INFO] [stdout] | [INFO] [stdout] 78 | #![cfg_attr(feature="clippy", feature(plugin))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `clippy` [INFO] [stdout] --> src/lib.rs:79:13 [INFO] [stdout] | [INFO] [stdout] 79 | #![cfg_attr(feature="clippy", plugin(clippy))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/env.rs:99:11 [INFO] [stdout] | [INFO] [stdout] 99 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `...` range patterns are deprecated [INFO] [stdout] --> src/model.rs:124:8 [INFO] [stdout] | [INFO] [stdout] 124 | 1...14 => unsafe { transmute(val as i8) }, [INFO] [stdout] | ^^^ help: use `..=` for an inclusive range [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2015) but is a hard error in Rust 2021! [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: `#[warn(ellipsis_inclusive_range_patterns)]` (part of `#[warn(rust_2021_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `transmute_ptr_to_ref` [INFO] [stdout] --> src/model.rs:249:9 [INFO] [stdout] | [INFO] [stdout] 249 | #[allow(transmute_ptr_to_ref)] // Clippy gives a false positive here. [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `useless_transmute` [INFO] [stdout] --> src/model.rs:508:11 [INFO] [stdout] | [INFO] [stdout] 508 | #[allow(useless_transmute)] // Clippy gives a false positive here. [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:32:11 [INFO] [stdout] | [INFO] [stdout] 32 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:129:11 [INFO] [stdout] | [INFO] [stdout] 129 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unresolved link to `sec` [INFO] [stdout] --> src/callback.rs:323:44 [INFO] [stdout] | [INFO] [stdout] 323 | /// Retrieve the elapsed solver runtime [sec]. [INFO] [stdout] | ^^^ no item named `sec` in scope [INFO] [stdout] | [INFO] [stdout] = help: to escape `[` and `]` characters, add '\' before them like `\[` or `\]` [INFO] [stdout] = note: `#[warn(rustdoc::broken_intra_doc_links)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: this URL is not a hyperlink [INFO] [stdout] --> src/error.rs:15:11 [INFO] [stdout] | [INFO] [stdout] 15 | /// See https://doc.rust-lang.org/std/ffi/struct.NulError.html [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: bare URLs are not automatically turned into clickable links [INFO] [stdout] = note: `#[warn(rustdoc::bare_urls)]` on by default [INFO] [stdout] help: use an automatic link instead [INFO] [stdout] | [INFO] [stdout] 15 | /// See [INFO] [stdout] | + + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.34s [INFO] [stderr] Generated /opt/rustwide/target/doc/gurobi/index.html [INFO] running `Command { std: "docker" "inspect" "5b63d5c2e564375228850690b3dbcd3cf1c292a97905ca9d82c04f7ba6d5e552", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5b63d5c2e564375228850690b3dbcd3cf1c292a97905ca9d82c04f7ba6d5e552", kill_on_drop: false }` [INFO] [stdout] 5b63d5c2e564375228850690b3dbcd3cf1c292a97905ca9d82c04f7ba6d5e552 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "RUSTC_BOOTSTRAP=1" "-e" "DOCS_RS=1" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:29356a839a4d14451438f794ce8414e707d72405f44418718d724d22562fe786" "/opt/rustwide/cargo-home/bin/cargo" "+8afe9ff1caa97654c31fb8c259dac9fdf67d6302" "rustdoc" "--lib" "-Zrustdoc-map" "--config" "build.rustdocflags=[\"--cfg\", \"docsrs\", \"-Z\", \"unstable-options\", \"--document-private-items\"]" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 3356bb73f9952400905eb2a239ec6c6faf0651de10239e95b6fb8aa1098c48ed [INFO] running `Command { std: "docker" "start" "-a" "3356bb73f9952400905eb2a239ec6c6faf0651de10239e95b6fb8aa1098c48ed", kill_on_drop: false }` [INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2024 [INFO] [stderr] Documenting gurobi v0.3.4 (/opt/rustwide/workdir) [INFO] [stdout] warning: unknown lint: `extend_from_slice` [INFO] [stdout] --> src/lib.rs:80:10 [INFO] [stdout] | [INFO] [stdout] 80 | #![allow(extend_from_slice)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unknown_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `explicit_iter_loop` [INFO] [stdout] --> src/lib.rs:81:10 [INFO] [stdout] | [INFO] [stdout] 81 | #![allow(explicit_iter_loop)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `clippy` [INFO] [stdout] --> src/lib.rs:78:13 [INFO] [stdout] | [INFO] [stdout] 78 | #![cfg_attr(feature="clippy", feature(plugin))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition value: `clippy` [INFO] [stdout] --> src/lib.rs:79:13 [INFO] [stdout] | [INFO] [stdout] 79 | #![cfg_attr(feature="clippy", plugin(clippy))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: remove the condition [INFO] [stdout] | [INFO] [stdout] = note: no expected values for `feature` [INFO] [stdout] = help: consider adding `clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/env.rs:99:11 [INFO] [stdout] | [INFO] [stdout] 99 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(renamed_and_removed_lints)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `...` range patterns are deprecated [INFO] [stdout] --> src/model.rs:124:8 [INFO] [stdout] | [INFO] [stdout] 124 | 1...14 => unsafe { transmute(val as i8) }, [INFO] [stdout] | ^^^ help: use `..=` for an inclusive range [INFO] [stdout] | [INFO] [stdout] = warning: this is accepted in the current edition (Rust 2015) but is a hard error in Rust 2021! [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: `#[warn(ellipsis_inclusive_range_patterns)]` (part of `#[warn(rust_2021_compatibility)]`) on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `transmute_ptr_to_ref` [INFO] [stdout] --> src/model.rs:249:9 [INFO] [stdout] | [INFO] [stdout] 249 | #[allow(transmute_ptr_to_ref)] // Clippy gives a false positive here. [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unknown lint: `useless_transmute` [INFO] [stdout] --> src/model.rs:508:11 [INFO] [stdout] | [INFO] [stdout] 508 | #[allow(useless_transmute)] // Clippy gives a false positive here. [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:10:9 [INFO] [stdout] | [INFO] [stdout] 10 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:32:11 [INFO] [stdout] | [INFO] [stdout] 32 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: lint `temporary_cstring_as_ptr` has been renamed to `dangling_pointers_from_temporaries` [INFO] [stdout] --> src/util.rs:129:11 [INFO] [stdout] | [INFO] [stdout] 129 | #[allow(temporary_cstring_as_ptr)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ help: use the new name: `dangling_pointers_from_temporaries` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unresolved link to `sec` [INFO] [stdout] --> src/callback.rs:323:44 [INFO] [stdout] | [INFO] [stdout] 323 | /// Retrieve the elapsed solver runtime [sec]. [INFO] [stdout] | ^^^ no item named `sec` in scope [INFO] [stdout] | [INFO] [stdout] = help: to escape `[` and `]` characters, add '\' before them like `\[` or `\]` [INFO] [stdout] = note: `#[warn(rustdoc::broken_intra_doc_links)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: this URL is not a hyperlink [INFO] [stdout] --> src/error.rs:15:11 [INFO] [stdout] | [INFO] [stdout] 15 | /// See https://doc.rust-lang.org/std/ffi/struct.NulError.html [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: bare URLs are not automatically turned into clickable links [INFO] [stdout] = note: `#[warn(rustdoc::bare_urls)]` on by default [INFO] [stdout] help: use an automatic link instead [INFO] [stdout] | [INFO] [stdout] 15 | /// See [INFO] [stdout] | + + [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.95s [INFO] [stderr] Generated /opt/rustwide/target/doc/gurobi/index.html [INFO] running `Command { std: "docker" "inspect" "3356bb73f9952400905eb2a239ec6c6faf0651de10239e95b6fb8aa1098c48ed", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3356bb73f9952400905eb2a239ec6c6faf0651de10239e95b6fb8aa1098c48ed", kill_on_drop: false }` [INFO] [stdout] 3356bb73f9952400905eb2a239ec6c6faf0651de10239e95b6fb8aa1098c48ed