[INFO] fetching crate ndless-freetype 0.1.3...
[INFO] checking ndless-freetype-0.1.3 against try#012cd62c9add58ab3910e44c137d87db3ab70f61 for pr-155915
[INFO] extracting crate ndless-freetype 0.1.3 into /workspace/builds/worker-2-tc2/source
[INFO] started tweaking crates.io crate ndless-freetype 0.1.3
[INFO] finished tweaking crates.io crate ndless-freetype 0.1.3
[INFO] tweaked toml for crates.io crate ndless-freetype 0.1.3 written to /workspace/builds/worker-2-tc2/source/Cargo.toml
[INFO] validating manifest of crates.io crate ndless-freetype 0.1.3 on toolchain 012cd62c9add58ab3910e44c137d87db3ab70f61
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+012cd62c9add58ab3910e44c137d87db3ab70f61" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+012cd62c9add58ab3910e44c137d87db3ab70f61" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]      Locking 8 packages to latest compatible versions
[INFO] [stderr]       Adding bitflags v1.3.2 (available: v2.11.1)
[INFO] [stderr]       Adding cstr_core v0.1.2 (available: v0.2.6)
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+012cd62c9add58ab3910e44c137d87db3ab70f61" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+012cd62c9add58ab3910e44c137d87db3ab70f61" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 613d294e72c7f58292e42648bfbe4f09b115c969eec75e25a6e79e36a9036f27
[INFO] running `Command { std: "docker" "start" "-a" "613d294e72c7f58292e42648bfbe4f09b115c969eec75e25a6e79e36a9036f27", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "613d294e72c7f58292e42648bfbe4f09b115c969eec75e25a6e79e36a9036f27", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "613d294e72c7f58292e42648bfbe4f09b115c969eec75e25a6e79e36a9036f27", kill_on_drop: false }`
[INFO] [stdout] 613d294e72c7f58292e42648bfbe4f09b115c969eec75e25a6e79e36a9036f27
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+012cd62c9add58ab3910e44c137d87db3ab70f61" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 6d341c9e94ad4ff724407844025acdaf1c70e95c69d915d23e4596915f5938a0
[INFO] running `Command { std: "docker" "start" "-a" "6d341c9e94ad4ff724407844025acdaf1c70e95c69d915d23e4596915f5938a0", kill_on_drop: false }`
[INFO] [stderr]     Checking cty v0.2.2
[INFO] [stderr]     Checking cty v0.1.5
[INFO] [stderr]     Checking memchr v2.8.0
[INFO] [stderr]     Checking failure v0.1.8
[INFO] [stderr]     Checking ndless-sys v0.2.0
[INFO] [stderr]     Checking embedded-freetype-sys v0.2.0
[INFO] [stderr]     Checking cstr_core v0.1.2
[INFO] [stderr]     Checking ndless-freetype v0.1.3 (/opt/rustwide/workdir)
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> src/glyph_slot.rs:97:17
[INFO] [stdout]    |
[INFO] [stdout] 97 |     pub fn outline(&self) -> Option<Outline> {
[INFO] [stdout]    |                    ^^^^^            ^^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                    |
[INFO] [stdout]    |                    the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout]    = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 97 |     pub fn outline(&self) -> Option<Outline<'_>> {
[INFO] [stdout]    |                                            ++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/library.rs:59:42
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let err = unsafe { ffi::FT_New_Library(&mut MEMORY, &mut raw) };
[INFO] [stdout]    |                                                ^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let err = unsafe { ffi::FT_New_Library(&raw mut MEMORY, &mut raw) };
[INFO] [stdout]    |                                                 +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: hiding a lifetime that's elided elsewhere is confusing
[INFO] [stdout]   --> src/glyph_slot.rs:97:17
[INFO] [stdout]    |
[INFO] [stdout] 97 |     pub fn outline(&self) -> Option<Outline> {
[INFO] [stdout]    |                    ^^^^^            ^^^^^^^ the same lifetime is hidden here
[INFO] [stdout]    |                    |
[INFO] [stdout]    |                    the lifetime is elided here
[INFO] [stdout]    |
[INFO] [stdout]    = help: the same lifetime is referred to in inconsistent ways, making the signature confusing
[INFO] [stdout]    = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default
[INFO] [stdout] help: use `'_` for type paths
[INFO] [stdout]    |
[INFO] [stdout] 97 |     pub fn outline(&self) -> Option<Outline<'_>> {
[INFO] [stdout]    |                                            ++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/library.rs:59:42
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let err = unsafe { ffi::FT_New_Library(&mut MEMORY, &mut raw) };
[INFO] [stdout]    |                                                ^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` (part of `#[warn(rust_2024_compatibility)]`) on by default
[INFO] [stdout] help: use `&raw mut` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 59 |         let err = unsafe { ffi::FT_New_Library(&raw mut MEMORY, &mut raw) };
[INFO] [stdout]    |                                                 +++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1.09s
[INFO] running `Command { std: "docker" "inspect" "6d341c9e94ad4ff724407844025acdaf1c70e95c69d915d23e4596915f5938a0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "6d341c9e94ad4ff724407844025acdaf1c70e95c69d915d23e4596915f5938a0", kill_on_drop: false }`
[INFO] [stdout] 6d341c9e94ad4ff724407844025acdaf1c70e95c69d915d23e4596915f5938a0
