[INFO] fetching crate chrome-native-rt 1.0.0... [INFO] checking chrome-native-rt-1.0.0 against master#ceab6128fa48a616bfd3e3adf4bc80133b8ee223 for no-never-type-fallback [INFO] extracting crate chrome-native-rt 1.0.0 into /workspace/builds/worker-4-tc1/source [INFO] validating manifest of crates.io crate chrome-native-rt 1.0.0 on toolchain ceab6128fa48a616bfd3e3adf4bc80133b8ee223 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ceab6128fa48a616bfd3e3adf4bc80133b8ee223" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] finished tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] tweaked toml for crates.io crate chrome-native-rt 1.0.0 written to /workspace/builds/worker-4-tc1/source/Cargo.toml [INFO] crate crates.io crate chrome-native-rt 1.0.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ceab6128fa48a616bfd3e3adf4bc80133b8ee223" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded chrome-native v1.0.0 [INFO] [stderr] Downloaded libloading v0.7.3 [INFO] [stderr] Downloaded serde_derive v1.0.144 [INFO] [stderr] Downloaded clap_derive v3.2.17 [INFO] [stderr] Downloaded serde v1.0.144 [INFO] [stderr] Downloaded serde_json v1.0.83 [INFO] [stderr] Downloaded clap v3.2.17 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+ceab6128fa48a616bfd3e3adf4bc80133b8ee223" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 090c48b5495bec0ea4c81baded9bb91ff1dd89e0080ac0a8ad2a147d4ee5848c [INFO] running `Command { std: "docker" "start" "-a" "090c48b5495bec0ea4c81baded9bb91ff1dd89e0080ac0a8ad2a147d4ee5848c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "090c48b5495bec0ea4c81baded9bb91ff1dd89e0080ac0a8ad2a147d4ee5848c", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "090c48b5495bec0ea4c81baded9bb91ff1dd89e0080ac0a8ad2a147d4ee5848c", kill_on_drop: false }` [INFO] [stdout] 090c48b5495bec0ea4c81baded9bb91ff1dd89e0080ac0a8ad2a147d4ee5848c [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+ceab6128fa48a616bfd3e3adf4bc80133b8ee223" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 0deb726742bf6d68e688e2404e623dd0ad712b8b259aec738e05ebd249e744b5 [INFO] running `Command { std: "docker" "start" "-a" "0deb726742bf6d68e688e2404e623dd0ad712b8b259aec738e05ebd249e744b5", kill_on_drop: false }` [INFO] [stderr] Compiling serde_derive v1.0.144 [INFO] [stderr] Compiling serde v1.0.144 [INFO] [stderr] Compiling libc v0.2.132 [INFO] [stderr] Compiling serde_json v1.0.83 [INFO] [stderr] Checking os_str_bytes v6.3.0 [INFO] [stderr] Checking once_cell v1.13.1 [INFO] [stderr] Checking bytes v1.2.1 [INFO] [stderr] Checking libloading v0.7.3 [INFO] [stderr] Compiling clap_derive v3.2.17 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking clap v3.2.17 [INFO] [stderr] Checking chrome-native v1.0.0 [INFO] [stderr] Checking chrome-native-rt v1.0.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 5.36s [INFO] running `Command { std: "docker" "inspect" "0deb726742bf6d68e688e2404e623dd0ad712b8b259aec738e05ebd249e744b5", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0deb726742bf6d68e688e2404e623dd0ad712b8b259aec738e05ebd249e744b5", kill_on_drop: false }` [INFO] [stdout] 0deb726742bf6d68e688e2404e623dd0ad712b8b259aec738e05ebd249e744b5