[INFO] cloning repository https://github.com/Kris030/camloc-detection-test
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/Kris030/camloc-detection-test" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FKris030%2Fcamloc-detection-test", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FKris030%2Fcamloc-detection-test'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] f36d7f42b14b69ab4dc7f9eca0cfd0fc7707a4e1
[INFO] checking Kris030/camloc-detection-test against master#5518eaa946291f00471af8b254b2a1715f234882 for pr-120393
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2FKris030%2Fcamloc-detection-test" "/workspace/builds/worker-3-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-3-tc1/source'...
[INFO] [stderr] done.
[INFO] validating manifest of git repo https://github.com/Kris030/camloc-detection-test on toolchain 5518eaa946291f00471af8b254b2a1715f234882
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking git repo https://github.com/Kris030/camloc-detection-test
[INFO] finished tweaking git repo https://github.com/Kris030/camloc-detection-test
[INFO] tweaked toml for git repo https://github.com/Kris030/camloc-detection-test written to /workspace/builds/worker-3-tc1/source/Cargo.toml
[INFO] crate git repo https://github.com/Kris030/camloc-detection-test already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded opencv v0.78.0
[INFO] [stderr]   Downloaded opencv-binding-generator v0.57.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 4d6c9a6699142aa5ab49b7ac72645800d047b6d389b715de75a2204623a11c7d
[INFO] running `Command { std: "docker" "start" "-a" "4d6c9a6699142aa5ab49b7ac72645800d047b6d389b715de75a2204623a11c7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "4d6c9a6699142aa5ab49b7ac72645800d047b6d389b715de75a2204623a11c7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "4d6c9a6699142aa5ab49b7ac72645800d047b6d389b715de75a2204623a11c7d", kill_on_drop: false }`
[INFO] [stdout] 4d6c9a6699142aa5ab49b7ac72645800d047b6d389b715de75a2204623a11c7d
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] c235131f36c05651d390db55182d6d42fcec8128e8b97e315ed74d0f995b1e2e
[INFO] running `Command { std: "docker" "start" "-a" "c235131f36c05651d390db55182d6d42fcec8128e8b97e315ed74d0f995b1e2e", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.139
[INFO] [stderr]    Compiling glob v0.3.1
[INFO] [stderr]    Compiling regex-syntax v0.6.28
[INFO] [stderr]    Compiling semver v1.0.16
[INFO] [stderr]    Compiling percent-encoding v2.2.0
[INFO] [stderr]    Compiling dunce v1.0.3
[INFO] [stderr]    Compiling memchr v2.5.0
[INFO] [stderr]    Compiling libloading v0.7.4
[INFO] [stderr]    Compiling maplit v1.0.2
[INFO] [stderr]    Compiling once_cell v1.17.1
[INFO] [stderr]    Compiling num-traits v0.2.15
[INFO] [stderr]    Compiling pkg-config v0.3.26
[INFO] [stderr]    Compiling vcpkg v0.2.15
[INFO] [stderr]    Compiling shlex v1.1.0
[INFO] [stderr]    Compiling clang-sys v1.6.0
[INFO] [stderr]    Compiling aho-corasick v0.7.20
[INFO] [stderr]    Compiling jobserver v0.1.26
[INFO] [stderr]    Compiling cc v1.0.79
[INFO] [stderr]    Compiling regex v1.7.1
[INFO] [stderr]    Compiling clang v2.0.0
[INFO] [stderr]    Compiling opencv-binding-generator v0.57.0
[INFO] [stderr]    Compiling opencv v0.78.0
[INFO] [stderr]     Checking detect v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/steps.rs:237:32
[INFO] [stdout]     |
[INFO] [stdout] 237 |     let Some(cols) = (unsafe { &COLORS }) else {
[INFO] [stdout]     |                                ^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout]     = note: `#[warn(static_mut_ref)]` on by default
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 237 |     let Some(cols) = (unsafe { addr_of!(COLORS) }) else {
[INFO] [stdout]     |                                ~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/steps.rs:237:32
[INFO] [stdout]     |
[INFO] [stdout] 237 |     let Some(cols) = (unsafe { &COLORS }) else {
[INFO] [stdout]     |                                ^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout]     = note: `#[warn(static_mut_ref)]` on by default
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 237 |     let Some(cols) = (unsafe { addr_of!(COLORS) }) else {
[INFO] [stdout]     |                                ~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished dev [unoptimized + debuginfo] target(s) in 1m 18s
[INFO] running `Command { std: "docker" "inspect" "c235131f36c05651d390db55182d6d42fcec8128e8b97e315ed74d0f995b1e2e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "c235131f36c05651d390db55182d6d42fcec8128e8b97e315ed74d0f995b1e2e", kill_on_drop: false }`
[INFO] [stdout] c235131f36c05651d390db55182d6d42fcec8128e8b97e315ed74d0f995b1e2e
