[INFO] fetching crate android_system_properties 0.1.5...
[INFO] checking android_system_properties-0.1.5 against master#b0696a5160711c068cb1f01b7437db7990d15750 for pr-121848
[INFO] extracting crate android_system_properties 0.1.5 into /workspace/builds/worker-7-tc1/source
[INFO] validating manifest of crates.io crate android_system_properties 0.1.5 on toolchain b0696a5160711c068cb1f01b7437db7990d15750
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b0696a5160711c068cb1f01b7437db7990d15750" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate android_system_properties 0.1.5
[INFO] finished tweaking crates.io crate android_system_properties 0.1.5
[INFO] tweaked toml for crates.io crate android_system_properties 0.1.5 written to /workspace/builds/worker-7-tc1/source/Cargo.toml
[INFO] crate crates.io crate android_system_properties 0.1.5 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b0696a5160711c068cb1f01b7437db7990d15750" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+b0696a5160711c068cb1f01b7437db7990d15750" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] e175719bdacaa268fb88bda536e362a230a03c7d26194d9ce05cb0d370470d34
[INFO] running `Command { std: "docker" "start" "-a" "e175719bdacaa268fb88bda536e362a230a03c7d26194d9ce05cb0d370470d34", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "e175719bdacaa268fb88bda536e362a230a03c7d26194d9ce05cb0d370470d34", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e175719bdacaa268fb88bda536e362a230a03c7d26194d9ce05cb0d370470d34", kill_on_drop: false }`
[INFO] [stdout] e175719bdacaa268fb88bda536e362a230a03c7d26194d9ce05cb0d370470d34
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+b0696a5160711c068cb1f01b7437db7990d15750" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 28e60a1a77ddd61813303cb14a20f693aaa20389cdfd3f17440af30501f574fa
[INFO] running `Command { std: "docker" "start" "-a" "28e60a1a77ddd61813303cb14a20f693aaa20389cdfd3f17440af30501f574fa", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.126
[INFO] [stderr]     Checking android_system_properties v0.1.5 (/opt/rustwide/workdir)
[INFO] [stdout] warning: `extern` fn uses type `unsafe fn(*mut String, *const i8, *const i8, u32)`, which is not FFI-safe
[INFO] [stdout]   --> src/lib.rs:56:37
[INFO] [stdout]    |
[INFO] [stdout] 56 | type SystemPropertyReadCallbackFn = unsafe extern "C" fn(*const c_void, Callback, *mut String) -> *const c_void;
[INFO] [stdout]    |                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not FFI-safe
[INFO] [stdout]    |
[INFO] [stdout]    = help: consider using an `extern fn(...) -> ...` function pointer instead
[INFO] [stdout]    = note: this function pointer has Rust-specific calling convention
[INFO] [stdout]    = note: `#[warn(improper_ctypes_definitions)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: `extern` fn uses type `unsafe fn(*mut String, *const i8, *const i8, u32)`, which is not FFI-safe
[INFO] [stdout]   --> src/lib.rs:56:37
[INFO] [stdout]    |
[INFO] [stdout] 56 | type SystemPropertyReadCallbackFn = unsafe extern "C" fn(*const c_void, Callback, *mut String) -> *const c_void;
[INFO] [stdout]    |                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not FFI-safe
[INFO] [stdout]    |
[INFO] [stdout]    = help: consider using an `extern fn(...) -> ...` function pointer instead
[INFO] [stdout]    = note: this function pointer has Rust-specific calling convention
[INFO] [stdout]    = note: `#[warn(improper_ctypes_definitions)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.58s
[INFO] running `Command { std: "docker" "inspect" "28e60a1a77ddd61813303cb14a20f693aaa20389cdfd3f17440af30501f574fa", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "28e60a1a77ddd61813303cb14a20f693aaa20389cdfd3f17440af30501f574fa", kill_on_drop: false }`
[INFO] [stdout] 28e60a1a77ddd61813303cb14a20f693aaa20389cdfd3f17440af30501f574fa
[INFO] checking android_system_properties-0.1.5 against try#bfe97fcae016881ad333f0ff8cea2cadb9cf136c for pr-121848
[INFO] extracting crate android_system_properties 0.1.5 into /workspace/builds/worker-7-tc2/source
[INFO] validating manifest of crates.io crate android_system_properties 0.1.5 on toolchain bfe97fcae016881ad333f0ff8cea2cadb9cf136c
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+bfe97fcae016881ad333f0ff8cea2cadb9cf136c" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate android_system_properties 0.1.5
[INFO] finished tweaking crates.io crate android_system_properties 0.1.5
[INFO] tweaked toml for crates.io crate android_system_properties 0.1.5 written to /workspace/builds/worker-7-tc2/source/Cargo.toml
[INFO] crate crates.io crate android_system_properties 0.1.5 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+bfe97fcae016881ad333f0ff8cea2cadb9cf136c" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+bfe97fcae016881ad333f0ff8cea2cadb9cf136c" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] abf6e880fcbdf8ee8b395a2e8132b1b5c50d0bcb31775ccbbedfd7943161dd52
[INFO] running `Command { std: "docker" "start" "-a" "abf6e880fcbdf8ee8b395a2e8132b1b5c50d0bcb31775ccbbedfd7943161dd52", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "abf6e880fcbdf8ee8b395a2e8132b1b5c50d0bcb31775ccbbedfd7943161dd52", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "abf6e880fcbdf8ee8b395a2e8132b1b5c50d0bcb31775ccbbedfd7943161dd52", kill_on_drop: false }`
[INFO] [stdout] abf6e880fcbdf8ee8b395a2e8132b1b5c50d0bcb31775ccbbedfd7943161dd52
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+bfe97fcae016881ad333f0ff8cea2cadb9cf136c" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] c45ebbd066d247a1d6a19d80c6fb3218950ab9170bfd58017e5b53c8dde054d0
[INFO] running `Command { std: "docker" "start" "-a" "c45ebbd066d247a1d6a19d80c6fb3218950ab9170bfd58017e5b53c8dde054d0", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.126
[INFO] [stderr]     Checking android_system_properties v0.1.5 (/opt/rustwide/workdir)
[INFO] [stdout] warning: `extern` fn uses type `unsafe fn(*mut String, *const i8, *const i8, u32)`, which is not FFI-safe
[INFO] [stdout]   --> src/lib.rs:56:37
[INFO] [stdout]    |
[INFO] [stdout] 56 | type SystemPropertyReadCallbackFn = unsafe extern "C" fn(*const c_void, Callback, *mut String) -> *const c_void;
[INFO] [stdout]    |                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not FFI-safe
[INFO] [stdout]    |
[INFO] [stdout]    = help: consider using an `extern fn(...) -> ...` function pointer instead
[INFO] [stdout]    = note: this function pointer has Rust-specific calling convention
[INFO] [stdout]    = note: `#[warn(improper_ctypes_definitions)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: `extern` fn uses type `unsafe fn(*mut String, *const i8, *const i8, u32)`, which is not FFI-safe
[INFO] [stdout]   --> src/lib.rs:56:37
[INFO] [stdout]    |
[INFO] [stdout] 56 | type SystemPropertyReadCallbackFn = unsafe extern "C" fn(*const c_void, Callback, *mut String) -> *const c_void;
[INFO] [stdout]    |                                     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ not FFI-safe
[INFO] [stdout]    |
[INFO] [stdout]    = help: consider using an `extern fn(...) -> ...` function pointer instead
[INFO] [stdout]    = note: this function pointer has Rust-specific calling convention
[INFO] [stdout]    = note: `#[warn(improper_ctypes_definitions)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 1 warning emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.57s
[INFO] running `Command { std: "docker" "inspect" "c45ebbd066d247a1d6a19d80c6fb3218950ab9170bfd58017e5b53c8dde054d0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "c45ebbd066d247a1d6a19d80c6fb3218950ab9170bfd58017e5b53c8dde054d0", kill_on_drop: false }`
[INFO] [stdout] c45ebbd066d247a1d6a19d80c6fb3218950ab9170bfd58017e5b53c8dde054d0
