[INFO] fetching crate blake2b-rs 0.2.0... [INFO] checking blake2b-rs-0.2.0 against try#6f8a6450478f69b8510c8976ab6c2a70b3b0e47c for pr-84920 [INFO] extracting crate blake2b-rs 0.2.0 into /workspace/builds/worker-5/source [INFO] validating manifest of crates.io crate blake2b-rs 0.2.0 on toolchain 6f8a6450478f69b8510c8976ab6c2a70b3b0e47c [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+6f8a6450478f69b8510c8976ab6c2a70b3b0e47c" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate blake2b-rs 0.2.0 [INFO] finished tweaking crates.io crate blake2b-rs 0.2.0 [INFO] tweaked toml for crates.io crate blake2b-rs 0.2.0 written to /workspace/builds/worker-5/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+6f8a6450478f69b8510c8976ab6c2a70b3b0e47c" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+6f8a6450478f69b8510c8976ab6c2a70b3b0e47c" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+6f8a6450478f69b8510c8976ab6c2a70b3b0e47c" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 3ef27c8e36cb4bd4633f9034cdaec432281f604cad4a2cca4630b5b4dde45a5f [INFO] running `Command { std: "docker" "start" "-a" "3ef27c8e36cb4bd4633f9034cdaec432281f604cad4a2cca4630b5b4dde45a5f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "3ef27c8e36cb4bd4633f9034cdaec432281f604cad4a2cca4630b5b4dde45a5f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "3ef27c8e36cb4bd4633f9034cdaec432281f604cad4a2cca4630b5b4dde45a5f", kill_on_drop: false }` [INFO] [stdout] 3ef27c8e36cb4bd4633f9034cdaec432281f604cad4a2cca4630b5b4dde45a5f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+6f8a6450478f69b8510c8976ab6c2a70b3b0e47c" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 36b8fd531313e9548e9b772558f2d8985febba2659e4c4c27e6915c1ca7bd599 [INFO] running `Command { std: "docker" "start" "-a" "36b8fd531313e9548e9b772558f2d8985febba2659e4c4c27e6915c1ca7bd599", kill_on_drop: false }` [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Checking byteorder v1.4.3 [INFO] [stderr] Checking rand_core v0.4.2 [INFO] [stderr] Compiling syn v1.0.72 [INFO] [stderr] Compiling arrayvec v0.4.12 [INFO] [stderr] Checking nodrop v0.1.14 [INFO] [stderr] Checking faster-hex v0.3.1 [INFO] [stderr] Compiling blake2b-rs v0.2.0 (/opt/rustwide/workdir) [INFO] [stderr] Checking itertools v0.8.2 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking crossbeam-utils v0.8.4 [INFO] [stderr] Checking rand_core v0.3.1 [INFO] [stderr] Checking rand_os v0.1.3 [INFO] [stderr] Checking regex-automata v0.1.9 [INFO] [stderr] Checking rand_xoshiro v0.1.0 [INFO] [stderr] Checking crossbeam-epoch v0.9.4 [INFO] [stderr] Checking crossbeam-channel v0.5.1 [INFO] [stderr] Checking bstr v0.2.16 [INFO] [stderr] Checking criterion-plot v0.3.1 [INFO] [stderr] Checking crossbeam-deque v0.8.0 [INFO] [stderr] Checking blake2-rfc v0.2.18 [INFO] [stderr] Checking rayon-core v1.9.0 [INFO] [stderr] Checking rayon v1.5.0 [INFO] [stderr] Checking csv v1.1.6 [INFO] [stderr] Compiling serde_derive v1.0.125 [INFO] [stderr] Checking criterion v0.2.11 [INFO] [stdout] warning: reference to packed field is unaligned [INFO] [stdout] --> src/binding_layout_tests.rs:202:18 [INFO] [stdout] | [INFO] [stdout] 202 | unsafe { &(*(::core::ptr::null::())).leaf_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unaligned_references)]` on by default [INFO] [stdout] = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! [INFO] [stdout] = note: for more information, see issue #82523 [INFO] [stdout] = note: fields of packed structs are not properly aligned, and creating a misaligned reference is undefined behavior (even if that reference is never dereferenced) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: reference to packed field is unaligned [INFO] [stdout] --> src/binding_layout_tests.rs:212:18 [INFO] [stdout] | [INFO] [stdout] 212 | unsafe { &(*(::core::ptr::null::())).node_offset as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! [INFO] [stdout] = note: for more information, see issue #82523 [INFO] [stdout] = note: fields of packed structs are not properly aligned, and creating a misaligned reference is undefined behavior (even if that reference is never dereferenced) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: reference to packed field is unaligned [INFO] [stdout] --> src/binding_layout_tests.rs:222:18 [INFO] [stdout] | [INFO] [stdout] 222 | unsafe { &(*(::core::ptr::null::())).xof_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = warning: this was previously accepted by the compiler but is being phased out; it will become a hard error in a future release! [INFO] [stdout] = note: for more information, see issue #82523 [INFO] [stdout] = note: fields of packed structs are not properly aligned, and creating a misaligned reference is undefined behavior (even if that reference is never dereferenced) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:17:14 [INFO] [stdout] | [INFO] [stdout] 17 | &(*(::core::ptr::null::())).__clang_max_align_nonce1 as *const _ as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deref_nullptr)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:29:14 [INFO] [stdout] | [INFO] [stdout] 29 | &(*(::core::ptr::null::())).__clang_max_align_nonce2 as *const _ as usize [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:54:19 [INFO] [stdout] | [INFO] [stdout] 54 | unsafe { &(*(::core::ptr::null::<__fsid_t>())).__val as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:78:19 [INFO] [stdout] | [INFO] [stdout] 78 | unsafe { &(*(::core::ptr::null::())).h as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:88:19 [INFO] [stdout] | [INFO] [stdout] 88 | unsafe { &(*(::core::ptr::null::())).t as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:98:19 [INFO] [stdout] | [INFO] [stdout] 98 | unsafe { &(*(::core::ptr::null::())).f as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:108:19 [INFO] [stdout] | [INFO] [stdout] 108 | unsafe { &(*(::core::ptr::null::())).buf as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:118:19 [INFO] [stdout] | [INFO] [stdout] 118 | unsafe { &(*(::core::ptr::null::())).buflen as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:128:19 [INFO] [stdout] | [INFO] [stdout] 128 | unsafe { &(*(::core::ptr::null::())).outlen as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:138:19 [INFO] [stdout] | [INFO] [stdout] 138 | unsafe { &(*(::core::ptr::null::())).last_node as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:162:19 [INFO] [stdout] | [INFO] [stdout] 162 | unsafe { &(*(::core::ptr::null::())).digest_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:172:19 [INFO] [stdout] | [INFO] [stdout] 172 | unsafe { &(*(::core::ptr::null::())).key_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:182:19 [INFO] [stdout] | [INFO] [stdout] 182 | unsafe { &(*(::core::ptr::null::())).fanout as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:192:19 [INFO] [stdout] | [INFO] [stdout] 192 | unsafe { &(*(::core::ptr::null::())).depth as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:202:19 [INFO] [stdout] | [INFO] [stdout] 202 | unsafe { &(*(::core::ptr::null::())).leaf_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:212:19 [INFO] [stdout] | [INFO] [stdout] 212 | unsafe { &(*(::core::ptr::null::())).node_offset as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:222:19 [INFO] [stdout] | [INFO] [stdout] 222 | unsafe { &(*(::core::ptr::null::())).xof_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:232:19 [INFO] [stdout] | [INFO] [stdout] 232 | unsafe { &(*(::core::ptr::null::())).node_depth as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:242:19 [INFO] [stdout] | [INFO] [stdout] 242 | unsafe { &(*(::core::ptr::null::())).inner_length as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:252:19 [INFO] [stdout] | [INFO] [stdout] 252 | unsafe { &(*(::core::ptr::null::())).reserved as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:262:19 [INFO] [stdout] | [INFO] [stdout] 262 | unsafe { &(*(::core::ptr::null::())).salt as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: dereferencing a null pointer [INFO] [stdout] --> src/binding_layout_tests.rs:272:19 [INFO] [stdout] | [INFO] [stdout] 272 | unsafe { &(*(::core::ptr::null::())).personal as *const _ as usize }, [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ this code causes undefined behavior when executed [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 25 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 27.38s [INFO] running `Command { std: "docker" "inspect" "36b8fd531313e9548e9b772558f2d8985febba2659e4c4c27e6915c1ca7bd599", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "36b8fd531313e9548e9b772558f2d8985febba2659e4c4c27e6915c1ca7bd599", kill_on_drop: false }` [INFO] [stdout] 36b8fd531313e9548e9b772558f2d8985febba2659e4c4c27e6915c1ca7bd599