[INFO] fetching crate gaol 0.2.1... [INFO] checking gaol-0.2.1 against master#ab869e094a907cc5d19b4080f22eccaf347f1f95 for pr-129604 [INFO] extracting crate gaol 0.2.1 into /workspace/builds/worker-7-tc1/source [INFO] validating manifest of crates.io crate gaol 0.2.1 on toolchain ab869e094a907cc5d19b4080f22eccaf347f1f95 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate gaol 0.2.1 [INFO] removed 0 missing tests [INFO] finished tweaking crates.io crate gaol 0.2.1 [INFO] tweaked toml for crates.io crate gaol 0.2.1 written to /workspace/builds/worker-7-tc1/source/Cargo.toml [INFO] crate crates.io crate gaol 0.2.1 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2021 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 11453a08552b76313ff06dba42a0f1d559137863fb695b383c60474a841b95d4 [INFO] running `Command { std: "docker" "start" "-a" "11453a08552b76313ff06dba42a0f1d559137863fb695b383c60474a841b95d4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "11453a08552b76313ff06dba42a0f1d559137863fb695b383c60474a841b95d4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "11453a08552b76313ff06dba42a0f1d559137863fb695b383c60474a841b95d4", kill_on_drop: false }` [INFO] [stdout] 11453a08552b76313ff06dba42a0f1d559137863fb695b383c60474a841b95d4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:923055f121b5182466d55868a8b05e67af8ba4a3a3f6bad814e953ca3cd3ac2a" "/opt/rustwide/cargo-home/bin/cargo" "+ab869e094a907cc5d19b4080f22eccaf347f1f95" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] f74d53b502a9606310ff3c0af893f08c7c2f0b0312d3446d887b2f6f78d7cc02 [INFO] running `Command { std: "docker" "start" "-a" "f74d53b502a9606310ff3c0af893f08c7c2f0b0312d3446d887b2f6f78d7cc02", kill_on_drop: false }` [INFO] [stderr] warning: no edition set: defaulting to the 2015 edition while the latest is 2021 [INFO] [stderr] Compiling libc v0.2.62 [INFO] [stderr] Compiling getrandom v0.1.12 [INFO] [stderr] Compiling log v0.4.8 [INFO] [stderr] Checking ppv-lite86 v0.2.5 [INFO] [stderr] Checking c2-chacha v0.2.2 [INFO] [stderr] Checking gaol v0.2.1 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused `#[macro_use]` import [INFO] [stdout] --> lib.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | #[macro_use] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> sandbox.rs:79:25 [INFO] [stdout] | [INFO] [stdout] 79 | Ok(Command::new(try!(env::current_exe()))) [INFO] [stdout] | ^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `platform::linux::seccomp` [INFO] [stdout] --> platform/linux/namespace.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | use platform::linux::seccomp; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `c_ulong` [INFO] [stdout] --> platform/linux/namespace.rs:19:33 [INFO] [stdout] | [INFO] [stdout] 19 | use libc::{self, c_char, c_int, c_ulong, c_void, gid_t, pid_t, size_t, ssize_t, uid_t}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | try!(jail.enter()); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:32:16 [INFO] [stdout] | [INFO] [stdout] 32 | let jail = try!(ChrootJail::new(profile)); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:78:21 [INFO] [stdout] | [INFO] [stdout] 78 | try!(jail.bind_mount(path)); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | try!(try!(File::create(&Path::new("/proc/self/setgroups"))).write_all(b"deny")); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | try!(try!(File::create(&Path::new("/proc/self/gid_map"))).write_all(gid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:201:5 [INFO] [stdout] | [INFO] [stdout] 201 | try!(try!(File::create(&Path::new("/proc/self/uid_map"))).write_all(uid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:196:10 [INFO] [stdout] | [INFO] [stdout] 196 | try!(try!(File::create(&Path::new("/proc/self/setgroups"))).write_all(b"deny")); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:199:10 [INFO] [stdout] | [INFO] [stdout] 199 | try!(try!(File::create(&Path::new("/proc/self/gid_map"))).write_all(gid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:201:10 [INFO] [stdout] | [INFO] [stdout] 201 | try!(try!(File::create(&Path::new("/proc/self/uid_map"))).write_all(uid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/seccomp.rs:295:11 [INFO] [stdout] | [INFO] [stdout] 295 | #[cfg(dump_bpf_sockets)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/seccomp.rs:310:15 [INFO] [stdout] | [INFO] [stdout] 310 | #[cfg(not(dump_bpf_sockets))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/mod.rs:55:11 [INFO] [stdout] | [INFO] [stdout] 55 | #[cfg(dump_bpf_sockets)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/mod.rs:61:15 [INFO] [stdout] | [INFO] [stdout] 61 | #[cfg(not(dump_bpf_sockets))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_386` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:73:7 [INFO] [stdout] | [INFO] [stdout] 73 | const EM_386: u32 = 3; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_PPC` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:74:7 [INFO] [stdout] | [INFO] [stdout] 74 | const EM_PPC: u32 = 20; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_PPC64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:75:7 [INFO] [stdout] | [INFO] [stdout] 75 | const EM_PPC64: u32 = 21; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_ARM` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:76:7 [INFO] [stdout] | [INFO] [stdout] 76 | const EM_ARM: u32 = 40; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_AARCH64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:78:7 [INFO] [stdout] | [INFO] [stdout] 78 | const EM_AARCH64: u32 = 183; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_X86` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:85:7 [INFO] [stdout] | [INFO] [stdout] 85 | const AUDIT_ARCH_X86: u32 = EM_386 | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_ARM` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:89:7 [INFO] [stdout] | [INFO] [stdout] 89 | const AUDIT_ARCH_ARM: u32 = EM_ARM | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_AARCH64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:91:7 [INFO] [stdout] | [INFO] [stdout] 91 | const AUDIT_ARCH_AARCH64: u32 = EM_AARCH64 | __AUDIT_ARCH_64BIT | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:93:7 [INFO] [stdout] | [INFO] [stdout] 93 | const AUDIT_ARCH_PPC: u32 = EM_PPC; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:95:7 [INFO] [stdout] | [INFO] [stdout] 95 | const AUDIT_ARCH_PPC64: u32 = EM_PPC64 | __AUDIT_ARCH_64BIT; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC64LE` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:97:7 [INFO] [stdout] | [INFO] [stdout] 97 | const AUDIT_ARCH_PPC64LE: u32 = EM_PPC64 | __AUDIT_ARCH_64BIT | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking rand_core v0.5.1 [INFO] [stdout] warning: 28 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking rand_chacha v0.2.1 [INFO] [stderr] Checking rand v0.7.2 [INFO] [stdout] warning: unused imports: `ChildSandboxMethods`, `ChildSandbox`, `Command`, `SandboxMethods`, and `Sandbox` [INFO] [stdout] --> tests/system-info-read.rs:8:21 [INFO] [stdout] | [INFO] [stdout] 8 | use gaol::sandbox::{ChildSandbox, ChildSandboxMethods, Command, Sandbox, SandboxMethods}; [INFO] [stdout] | ^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^ ^^^^^^^ ^^^^^^^ ^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `c_char`, `c_int`, `c_void`, and `size_t` [INFO] [stdout] --> tests/system-info-read.rs:9:12 [INFO] [stdout] | [INFO] [stdout] 9 | use libc::{c_char, c_int, c_void, size_t}; [INFO] [stdout] | ^^^^^^ ^^^^^ ^^^^^^ ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::env` [INFO] [stdout] --> tests/system-info-read.rs:10:5 [INFO] [stdout] | [INFO] [stdout] 10 | use std::env; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::ffi::CString` [INFO] [stdout] --> tests/system-info-read.rs:11:5 [INFO] [stdout] | [INFO] [stdout] 11 | use std::ffi::CString; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::iter` [INFO] [stdout] --> tests/system-info-read.rs:12:5 [INFO] [stdout] | [INFO] [stdout] 12 | use std::iter; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::ptr` [INFO] [stdout] --> tests/system-info-read.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | use std::ptr; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: static `SYSCTL_NAME` is never used [INFO] [stdout] --> tests/system-info-read.rs:15:8 [INFO] [stdout] | [INFO] [stdout] 15 | static SYSCTL_NAME: &'static str = "hw.ncpu"; [INFO] [stdout] | ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `allowance_profile` is never used [INFO] [stdout] --> tests/system-info-read.rs:32:4 [INFO] [stdout] | [INFO] [stdout] 32 | fn allowance_profile() -> Profile { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: function `prohibition_profile` is never used [INFO] [stdout] --> tests/system-info-read.rs:36:4 [INFO] [stdout] | [INFO] [stdout] 36 | fn prohibition_profile() -> Profile { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 9 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `#[macro_use]` import [INFO] [stdout] --> lib.rs:11:1 [INFO] [stdout] | [INFO] [stdout] 11 | #[macro_use] [INFO] [stdout] | ^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> sandbox.rs:79:25 [INFO] [stdout] | [INFO] [stdout] 79 | Ok(Command::new(try!(env::current_exe()))) [INFO] [stdout] | ^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `platform::linux::seccomp` [INFO] [stdout] --> platform/linux/namespace.rs:13:5 [INFO] [stdout] | [INFO] [stdout] 13 | use platform::linux::seccomp; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `c_ulong` [INFO] [stdout] --> platform/linux/namespace.rs:19:33 [INFO] [stdout] | [INFO] [stdout] 19 | use libc::{self, c_char, c_int, c_ulong, c_void, gid_t, pid_t, size_t, ssize_t, uid_t}; [INFO] [stdout] | ^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:33:5 [INFO] [stdout] | [INFO] [stdout] 33 | try!(jail.enter()); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:32:16 [INFO] [stdout] | [INFO] [stdout] 32 | let jail = try!(ChrootJail::new(profile)); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:78:21 [INFO] [stdout] | [INFO] [stdout] 78 | try!(jail.bind_mount(path)); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:196:5 [INFO] [stdout] | [INFO] [stdout] 196 | try!(try!(File::create(&Path::new("/proc/self/setgroups"))).write_all(b"deny")); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:199:5 [INFO] [stdout] | [INFO] [stdout] 199 | try!(try!(File::create(&Path::new("/proc/self/gid_map"))).write_all(gid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:201:5 [INFO] [stdout] | [INFO] [stdout] 201 | try!(try!(File::create(&Path::new("/proc/self/uid_map"))).write_all(uid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:196:10 [INFO] [stdout] | [INFO] [stdout] 196 | try!(try!(File::create(&Path::new("/proc/self/setgroups"))).write_all(b"deny")); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:199:10 [INFO] [stdout] | [INFO] [stdout] 199 | try!(try!(File::create(&Path::new("/proc/self/gid_map"))).write_all(gid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> platform/linux/namespace.rs:201:10 [INFO] [stdout] | [INFO] [stdout] 201 | try!(try!(File::create(&Path::new("/proc/self/uid_map"))).write_all(uid_contents.as_bytes())); [INFO] [stdout] | ^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/seccomp.rs:295:11 [INFO] [stdout] | [INFO] [stdout] 295 | #[cfg(dump_bpf_sockets)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/seccomp.rs:310:15 [INFO] [stdout] | [INFO] [stdout] 310 | #[cfg(not(dump_bpf_sockets))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/mod.rs:55:11 [INFO] [stdout] | [INFO] [stdout] 55 | #[cfg(dump_bpf_sockets)] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unexpected `cfg` condition name: `dump_bpf_sockets` [INFO] [stdout] --> platform/linux/mod.rs:61:15 [INFO] [stdout] | [INFO] [stdout] 61 | #[cfg(not(dump_bpf_sockets))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = help: consider using a Cargo feature instead [INFO] [stdout] = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: [INFO] [stdout] [lints.rust] [INFO] [stdout] unexpected_cfgs = { level = "warn", check-cfg = ['cfg(dump_bpf_sockets)'] } [INFO] [stdout] = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(dump_bpf_sockets)");` to the top of the `build.rs` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: calls to `std::mem::drop` with a value that implements `Copy` does nothing [INFO] [stdout] --> tests/file-read-all.rs:61:9 [INFO] [stdout] | [INFO] [stdout] 61 | drop(realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char)); [INFO] [stdout] | ^^^^^-------------------------------------------------------------------------^ [INFO] [stdout] | | [INFO] [stdout] | argument has type `*mut i8` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dropping_copy_types)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the expression or result [INFO] [stdout] | [INFO] [stdout] 61 - drop(realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char)); [INFO] [stdout] 61 + let _ = realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char); [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: calls to `std::mem::drop` with a value that implements `Copy` does nothing [INFO] [stdout] --> tests/file-read-metadata.rs:62:9 [INFO] [stdout] | [INFO] [stdout] 62 | drop(realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char)); [INFO] [stdout] | ^^^^^-------------------------------------------------------------------------^ [INFO] [stdout] | | [INFO] [stdout] | argument has type `*mut i8` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dropping_copy_types)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the expression or result [INFO] [stdout] | [INFO] [stdout] 62 - drop(realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char)); [INFO] [stdout] 62 + let _ = realpath(c_temp_path.as_ptr(), new_temp_path.as_mut_ptr() as *mut c_char); [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_386` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:73:7 [INFO] [stdout] | [INFO] [stdout] 73 | const EM_386: u32 = 3; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_PPC` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:74:7 [INFO] [stdout] | [INFO] [stdout] 74 | const EM_PPC: u32 = 20; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_PPC64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:75:7 [INFO] [stdout] | [INFO] [stdout] 75 | const EM_PPC64: u32 = 21; [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_ARM` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:76:7 [INFO] [stdout] | [INFO] [stdout] 76 | const EM_ARM: u32 = 40; [INFO] [stdout] | ^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `EM_AARCH64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:78:7 [INFO] [stdout] | [INFO] [stdout] 78 | const EM_AARCH64: u32 = 183; [INFO] [stdout] | ^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_X86` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:85:7 [INFO] [stdout] | [INFO] [stdout] 85 | const AUDIT_ARCH_X86: u32 = EM_386 | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_ARM` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:89:7 [INFO] [stdout] | [INFO] [stdout] 89 | const AUDIT_ARCH_ARM: u32 = EM_ARM | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_AARCH64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:91:7 [INFO] [stdout] | [INFO] [stdout] 91 | const AUDIT_ARCH_AARCH64: u32 = EM_AARCH64 | __AUDIT_ARCH_64BIT | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:93:7 [INFO] [stdout] | [INFO] [stdout] 93 | const AUDIT_ARCH_PPC: u32 = EM_PPC; [INFO] [stdout] | ^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC64` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:95:7 [INFO] [stdout] | [INFO] [stdout] 95 | const AUDIT_ARCH_PPC64: u32 = EM_PPC64 | __AUDIT_ARCH_64BIT; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: constant `AUDIT_ARCH_PPC64LE` is never used [INFO] [stdout] --> platform/linux/seccomp.rs:97:7 [INFO] [stdout] | [INFO] [stdout] 97 | const AUDIT_ARCH_PPC64LE: u32 = EM_PPC64 | __AUDIT_ARCH_64BIT | __AUDIT_ARCH_LE; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 28 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 4.11s [INFO] running `Command { std: "docker" "inspect" "f74d53b502a9606310ff3c0af893f08c7c2f0b0312d3446d887b2f6f78d7cc02", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f74d53b502a9606310ff3c0af893f08c7c2f0b0312d3446d887b2f6f78d7cc02", kill_on_drop: false }` [INFO] [stdout] f74d53b502a9606310ff3c0af893f08c7c2f0b0312d3446d887b2f6f78d7cc02