[INFO] fetching crate chrome-native-rt 1.0.0... [INFO] checking chrome-native-rt-1.0.0 against master#22572d0994593197593e2a1b7b18d720a9a349a7 for pr-126452-1 [INFO] extracting crate chrome-native-rt 1.0.0 into /workspace/builds/worker-4-tc1/source [INFO] validating manifest of crates.io crate chrome-native-rt 1.0.0 on toolchain 22572d0994593197593e2a1b7b18d720a9a349a7 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] finished tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] tweaked toml for crates.io crate chrome-native-rt 1.0.0 written to /workspace/builds/worker-4-tc1/source/Cargo.toml [INFO] crate crates.io crate chrome-native-rt 1.0.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded clap_derive v3.2.17 [INFO] [stderr] Downloaded chrome-native v1.0.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 8c6366e3a03ec12b6f875c2153a5208070218e74abb8305f312e36e1f6368404 [INFO] running `Command { std: "docker" "start" "-a" "8c6366e3a03ec12b6f875c2153a5208070218e74abb8305f312e36e1f6368404", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "8c6366e3a03ec12b6f875c2153a5208070218e74abb8305f312e36e1f6368404", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "8c6366e3a03ec12b6f875c2153a5208070218e74abb8305f312e36e1f6368404", kill_on_drop: false }` [INFO] [stdout] 8c6366e3a03ec12b6f875c2153a5208070218e74abb8305f312e36e1f6368404 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+22572d0994593197593e2a1b7b18d720a9a349a7" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] abdbdb57304c3dc4e4bf93780f4425937efc2a3f9411f4fbaf6bc88d113f66d8 [INFO] running `Command { std: "docker" "start" "-a" "abdbdb57304c3dc4e4bf93780f4425937efc2a3f9411f4fbaf6bc88d113f66d8", kill_on_drop: false }` [INFO] [stderr] Compiling serde_derive v1.0.144 [INFO] [stderr] Compiling serde v1.0.144 [INFO] [stderr] Compiling serde_json v1.0.83 [INFO] [stderr] Compiling proc-macro-error-attr v1.0.4 [INFO] [stderr] Checking ryu v1.0.11 [INFO] [stderr] Checking itoa v1.0.3 [INFO] [stderr] Checking once_cell v1.13.1 [INFO] [stderr] Checking textwrap v0.15.0 [INFO] [stderr] Checking libloading v0.7.3 [INFO] [stderr] Checking bytes v1.2.1 [INFO] [stderr] Compiling proc-macro-error v1.0.4 [INFO] [stderr] Compiling clap_derive v3.2.17 [INFO] [stderr] Checking clap v3.2.17 [INFO] [stderr] Checking chrome-native v1.0.0 [INFO] [stderr] Checking chrome-native-rt v1.0.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 12.22s [INFO] running `Command { std: "docker" "inspect" "abdbdb57304c3dc4e4bf93780f4425937efc2a3f9411f4fbaf6bc88d113f66d8", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "abdbdb57304c3dc4e4bf93780f4425937efc2a3f9411f4fbaf6bc88d113f66d8", kill_on_drop: false }` [INFO] [stdout] abdbdb57304c3dc4e4bf93780f4425937efc2a3f9411f4fbaf6bc88d113f66d8 [INFO] checking chrome-native-rt-1.0.0 against try#6289438dbad80b1a0029c66dd3f6abf57c2c51be for pr-126452-1 [INFO] extracting crate chrome-native-rt 1.0.0 into /workspace/builds/worker-4-tc2/source [INFO] validating manifest of crates.io crate chrome-native-rt 1.0.0 on toolchain 6289438dbad80b1a0029c66dd3f6abf57c2c51be [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] finished tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] tweaked toml for crates.io crate chrome-native-rt 1.0.0 written to /workspace/builds/worker-4-tc2/source/Cargo.toml [INFO] crate crates.io crate chrome-native-rt 1.0.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ca8227070bfe9c3186c7713f0b2b7ca2853ee9f2f8da6a6a7741eed323a6f01f [INFO] running `Command { std: "docker" "start" "-a" "ca8227070bfe9c3186c7713f0b2b7ca2853ee9f2f8da6a6a7741eed323a6f01f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ca8227070bfe9c3186c7713f0b2b7ca2853ee9f2f8da6a6a7741eed323a6f01f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ca8227070bfe9c3186c7713f0b2b7ca2853ee9f2f8da6a6a7741eed323a6f01f", kill_on_drop: false }` [INFO] [stdout] ca8227070bfe9c3186c7713f0b2b7ca2853ee9f2f8da6a6a7741eed323a6f01f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+6289438dbad80b1a0029c66dd3f6abf57c2c51be" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 81e2aca31c372b54c7b7c9c19c9fdce78c04796e9563f093d2967055a87b2396 [INFO] running `Command { std: "docker" "start" "-a" "81e2aca31c372b54c7b7c9c19c9fdce78c04796e9563f093d2967055a87b2396", kill_on_drop: false }` [INFO] [stderr] Compiling serde_derive v1.0.144 [INFO] [stderr] Compiling serde v1.0.144 [INFO] [stderr] Compiling serde_json v1.0.83 [INFO] [stderr] Compiling proc-macro-error-attr v1.0.4 [INFO] [stderr] Checking itoa v1.0.3 [INFO] [stderr] Checking ryu v1.0.11 [INFO] [stderr] Checking once_cell v1.13.1 [INFO] [stderr] Checking textwrap v0.15.0 [INFO] [stderr] Checking libloading v0.7.3 [INFO] [stderr] Checking bytes v1.2.1 [INFO] [stderr] Compiling proc-macro-error v1.0.4 [INFO] [stderr] Compiling clap_derive v3.2.17 [INFO] [stderr] Checking clap v3.2.17 [INFO] [stderr] Checking chrome-native v1.0.0 [INFO] [stderr] Checking chrome-native-rt v1.0.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 11.32s [INFO] running `Command { std: "docker" "inspect" "81e2aca31c372b54c7b7c9c19c9fdce78c04796e9563f093d2967055a87b2396", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "81e2aca31c372b54c7b7c9c19c9fdce78c04796e9563f093d2967055a87b2396", kill_on_drop: false }` [INFO] [stdout] 81e2aca31c372b54c7b7c9c19c9fdce78c04796e9563f093d2967055a87b2396