[INFO] fetching crate ruru 0.9.3... [INFO] documenting ruru-0.9.3 against 1.46.0 for beta-1.47-rustdoc-1 [INFO] extracting crate ruru 0.9.3 into /workspace/builds/worker-10/source [INFO] validating manifest of crates.io crate ruru 0.9.3 on toolchain 1.46.0 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate ruru 0.9.3 [INFO] finished tweaking crates.io crate ruru 0.9.3 [INFO] tweaked toml for crates.io crate ruru 0.9.3 written to /workspace/builds/worker-10/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+1.46.0" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-10/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-10/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+1.46.0" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] dac361616e60352eb3ecadcad8fdb65fe234c10fa50ced88bbfba08c91f3d9b3 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "dac361616e60352eb3ecadcad8fdb65fe234c10fa50ced88bbfba08c91f3d9b3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "dac361616e60352eb3ecadcad8fdb65fe234c10fa50ced88bbfba08c91f3d9b3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "dac361616e60352eb3ecadcad8fdb65fe234c10fa50ced88bbfba08c91f3d9b3", kill_on_drop: false }` [INFO] [stdout] dac361616e60352eb3ecadcad8fdb65fe234c10fa50ced88bbfba08c91f3d9b3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-10/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-10/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTDOCFLAGS=--cap-lints=warn" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+1.46.0" "doc" "--frozen" "--no-deps" "--document-private-items" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 605bb6203d4431fa87380d07b895628d8007e68c678c28e4856dcd9d14e1d64a [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "605bb6203d4431fa87380d07b895628d8007e68c678c28e4856dcd9d14e1d64a", kill_on_drop: false }` [INFO] [stderr] Compiling ruby-sys v0.2.20 [INFO] [stderr] Documenting ruru v0.9.3 (/opt/rustwide/workdir) [INFO] [stdout] warning: `#[inline]` is ignored on function prototypes [INFO] [stdout] --> src/class/traits/object.rs:46:5 [INFO] [stdout] | [INFO] [stdout] 46 | #[inline] [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_attributes)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `extern` fn uses type `class::any_object::AnyObject`, which is not FFI-safe [INFO] [stdout] --> src/binding/hash.rs:49:37 [INFO] [stdout] | [INFO] [stdout] 49 | extern "C" fn each_callback(key: AnyObject, value: AnyObject, closure: CallbackMutPtr) [INFO] [stdout] | ^^^^^^^^^ not FFI-safe [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(improper_ctypes_definitions)]` on by default [INFO] [stdout] = help: consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this struct [INFO] [stdout] = note: this struct has unspecified layout [INFO] [stdout] note: the type is defined here [INFO] [stdout] --> src/class/any_object.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / pub struct AnyObject { [INFO] [stdout] 53 | | value: Value, [INFO] [stdout] 54 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: `extern` fn uses type `class::any_object::AnyObject`, which is not FFI-safe [INFO] [stdout] --> src/binding/hash.rs:49:55 [INFO] [stdout] | [INFO] [stdout] 49 | extern "C" fn each_callback(key: AnyObject, value: AnyObject, closure: CallbackMutPtr) [INFO] [stdout] | ^^^^^^^^^ not FFI-safe [INFO] [stdout] | [INFO] [stdout] = help: consider adding a `#[repr(C)]` or `#[repr(transparent)]` attribute to this struct [INFO] [stdout] = note: this struct has unspecified layout [INFO] [stdout] note: the type is defined here [INFO] [stdout] --> src/class/any_object.rs:52:1 [INFO] [stdout] | [INFO] [stdout] 52 | / pub struct AnyObject { [INFO] [stdout] 53 | | value: Value, [INFO] [stdout] 54 | | } [INFO] [stdout] | |_^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 2.26s [INFO] running `Command { std: "docker" "inspect" "605bb6203d4431fa87380d07b895628d8007e68c678c28e4856dcd9d14e1d64a", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "605bb6203d4431fa87380d07b895628d8007e68c678c28e4856dcd9d14e1d64a", kill_on_drop: false }` [INFO] [stdout] 605bb6203d4431fa87380d07b895628d8007e68c678c28e4856dcd9d14e1d64a