[INFO] fetching crate chrome-native-rt 1.0.0... [INFO] checking chrome-native-rt-1.0.0 against master#ab869e094a907cc5d19b4080f22eccaf347f1f95 for pr-129604 [INFO] extracting crate chrome-native-rt 1.0.0 into /workspace/builds/worker-6-tc1/source [INFO] validating manifest of crates.io crate chrome-native-rt 1.0.0 on toolchain ab869e094a907cc5d19b4080f22eccaf347f1f95 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] finished tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] tweaked toml for crates.io crate chrome-native-rt 1.0.0 written to /workspace/builds/worker-6-tc1/source/Cargo.toml [INFO] crate crates.io crate chrome-native-rt 1.0.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded chrome-native v1.0.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] ed22acfa278c075ea3301a390672575cc9e8c72dfc7f51e381400f2f32e7342b [INFO] running `Command { std: "docker" "start" "-a" "ed22acfa278c075ea3301a390672575cc9e8c72dfc7f51e381400f2f32e7342b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "ed22acfa278c075ea3301a390672575cc9e8c72dfc7f51e381400f2f32e7342b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ed22acfa278c075ea3301a390672575cc9e8c72dfc7f51e381400f2f32e7342b", kill_on_drop: false }` [INFO] [stdout] ed22acfa278c075ea3301a390672575cc9e8c72dfc7f51e381400f2f32e7342b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 0980def8377bf508d0e7b3829e305bd6049bfed78835d7f903386745317dcc72 [INFO] running `Command { std: "docker" "start" "-a" "0980def8377bf508d0e7b3829e305bd6049bfed78835d7f903386745317dcc72", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.43 [INFO] [stderr] Compiling unicode-ident v1.0.3 [INFO] [stderr] Compiling quote v1.0.21 [INFO] [stderr] Compiling syn v1.0.99 [INFO] [stderr] Compiling version_check v0.9.4 [INFO] [stderr] Compiling serde_derive v1.0.144 [INFO] [stderr] Compiling serde v1.0.144 [INFO] [stderr] Compiling autocfg v1.1.0 [INFO] [stderr] Compiling libc v0.2.132 [INFO] [stderr] Compiling serde_json v1.0.83 [INFO] [stderr] Compiling heck v0.4.0 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Checking ryu v1.0.11 [INFO] [stderr] Checking itoa v1.0.3 [INFO] [stderr] Checking os_str_bytes v6.3.0 [INFO] [stderr] Checking once_cell v1.13.1 [INFO] [stderr] Checking strsim v0.10.0 [INFO] [stderr] Checking cfg-if v1.0.0 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Checking textwrap v0.15.0 [INFO] [stderr] Checking termcolor v1.1.3 [INFO] [stderr] Checking libloading v0.7.3 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking bytes v1.2.1 [INFO] [stderr] Compiling proc-macro-error-attr v1.0.4 [INFO] [stderr] Compiling proc-macro-error v1.0.4 [INFO] [stderr] Compiling indexmap v1.9.1 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Compiling thiserror-impl v1.0.32 [INFO] [stderr] Compiling clap_derive v3.2.17 [INFO] [stderr] Checking thiserror v1.0.32 [INFO] [stderr] Checking clap v3.2.17 [INFO] [stderr] Checking chrome-native v1.0.0 [INFO] [stderr] Checking chrome-native-rt v1.0.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 14.99s [INFO] running `Command { std: "docker" "inspect" "0980def8377bf508d0e7b3829e305bd6049bfed78835d7f903386745317dcc72", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0980def8377bf508d0e7b3829e305bd6049bfed78835d7f903386745317dcc72", kill_on_drop: false }` [INFO] [stdout] 0980def8377bf508d0e7b3829e305bd6049bfed78835d7f903386745317dcc72