[INFO] crate pest-deconstruct 0.2.0 is already in cache [INFO] checking pest-deconstruct-0.2.0 against master#fdc0011561c6365c596dfd8fa1ef388162bc89c7 for pr-66504-1 [INFO] extracting crate pest-deconstruct 0.2.0 into /workspace/builds/worker-9/source [INFO] validating manifest of crates.io crate pest-deconstruct 0.2.0 on toolchain fdc0011561c6365c596dfd8fa1ef388162bc89c7 [INFO] running `"/workspace/cargo-home/bin/cargo" "+fdc0011561c6365c596dfd8fa1ef388162bc89c7" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started tweaking crates.io crate pest-deconstruct 0.2.0 [INFO] removed 0 missing examples [INFO] finished tweaking crates.io crate pest-deconstruct 0.2.0 [INFO] tweaked toml for crates.io crate pest-deconstruct 0.2.0 written to /workspace/builds/worker-9/source/Cargo.toml [INFO] running `"/workspace/cargo-home/bin/cargo" "+fdc0011561c6365c596dfd8fa1ef388162bc89c7" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/workspace/cargo-home/bin/cargo" "+fdc0011561c6365c596dfd8fa1ef388162bc89c7" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+fdc0011561c6365c596dfd8fa1ef388162bc89c7" "check" "--frozen" "--all" "--all-targets"` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] b78ea4c448d28b33ae946c1c5014d7a8594a4d03542da153026c906308458634 [INFO] running `"docker" "start" "-a" "b78ea4c448d28b33ae946c1c5014d7a8594a4d03542da153026c906308458634"` [INFO] [stderr] Compiling libc v0.2.66 [INFO] [stderr] Compiling backtrace-sys v0.1.32 [INFO] [stderr] Compiling backtrace v0.3.40 [INFO] [stderr] Compiling failure v0.1.6 [INFO] [stderr] Compiling single v1.0.0 [INFO] [stderr] Compiling pest-deconstruct-derive v0.2.0 [INFO] [stderr] Checking pest-deconstruct v0.2.0 (/opt/rustwide/workdir) [INFO] [stderr] warning: use of deprecated item 'std::mem::uninitialized': use `mem::MaybeUninit` instead [INFO] [stderr] --> src/lib.rs:167:34 [INFO] [stderr] | [INFO] [stderr] 167 | let mut pairs = unsafe { std::mem::uninitialized() }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: use of deprecated item 'std::mem::uninitialized': use `mem::MaybeUninit` instead [INFO] [stderr] --> src/lib.rs:167:34 [INFO] [stderr] | [INFO] [stderr] 167 | let mut pairs = unsafe { std::mem::uninitialized() }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(deprecated)]` on by default [INFO] [stderr] [INFO] [stderr] warning: the type `std::iter::Peekable>` does not permit being left uninitialized [INFO] [stderr] --> src/lib.rs:167:34 [INFO] [stderr] | [INFO] [stderr] 167 | let mut pairs = unsafe { std::mem::uninitialized() }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | this code causes undefined behavior when executed [INFO] [stderr] | help: use `MaybeUninit` instead, and only call `assume_init` after initialization is done [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(invalid_value)]` on by default [INFO] [stderr] note: std::ptr::NonNull>>> must be non-null (in this struct field) [INFO] [stderr] [INFO] [stderr] warning: the type `std::iter::Peekable>` does not permit being left uninitialized [INFO] [stderr] --> src/lib.rs:167:34 [INFO] [stderr] | [INFO] [stderr] 167 | let mut pairs = unsafe { std::mem::uninitialized() }; [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | | [INFO] [stderr] | this code causes undefined behavior when executed [INFO] [stderr] | help: use `MaybeUninit` instead, and only call `assume_init` after initialization is done [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(invalid_value)]` on by default [INFO] [stderr] note: std::ptr::NonNull>>> must be non-null (in this struct field) [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 6.07s [INFO] running `"docker" "inspect" "b78ea4c448d28b33ae946c1c5014d7a8594a4d03542da153026c906308458634"` [INFO] running `"docker" "rm" "-f" "b78ea4c448d28b33ae946c1c5014d7a8594a4d03542da153026c906308458634"` [INFO] [stdout] b78ea4c448d28b33ae946c1c5014d7a8594a4d03542da153026c906308458634