[INFO] fetching crate chrome-native-rt 1.0.0... [INFO] checking chrome-native-rt-1.0.0 against master#38352b01ae4af9300be03b805d6db68c45e51068 for pr-129864 [INFO] extracting crate chrome-native-rt 1.0.0 into /workspace/builds/worker-4-tc1/source [INFO] validating manifest of crates.io crate chrome-native-rt 1.0.0 on toolchain 38352b01ae4af9300be03b805d6db68c45e51068 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+38352b01ae4af9300be03b805d6db68c45e51068" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] finished tweaking crates.io crate chrome-native-rt 1.0.0 [INFO] tweaked toml for crates.io crate chrome-native-rt 1.0.0 written to /workspace/builds/worker-4-tc1/source/Cargo.toml [INFO] crate crates.io crate chrome-native-rt 1.0.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+38352b01ae4af9300be03b805d6db68c45e51068" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Updating crates.io index [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded clap_derive v3.2.17 [INFO] [stderr] Downloaded chrome-native v1.0.0 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+38352b01ae4af9300be03b805d6db68c45e51068" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] cdc5a4cfae5bc213c0dfb49a86a93b5410f9f19b6b87ef265d617442b6f926cd [INFO] running `Command { std: "docker" "start" "-a" "cdc5a4cfae5bc213c0dfb49a86a93b5410f9f19b6b87ef265d617442b6f926cd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "cdc5a4cfae5bc213c0dfb49a86a93b5410f9f19b6b87ef265d617442b6f926cd", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "cdc5a4cfae5bc213c0dfb49a86a93b5410f9f19b6b87ef265d617442b6f926cd", kill_on_drop: false }` [INFO] [stdout] cdc5a4cfae5bc213c0dfb49a86a93b5410f9f19b6b87ef265d617442b6f926cd [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:ceb6ea022f8a89cebbe621bb4987e73a935bd40dfbb726f832cfff4742a5b95a" "/opt/rustwide/cargo-home/bin/cargo" "+38352b01ae4af9300be03b805d6db68c45e51068" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d6290b9e9f5ecd1d622e9ef16755bd70e4f7d6ffab7d0f09f1d3eead7d6f36c5 [INFO] running `Command { std: "docker" "start" "-a" "d6290b9e9f5ecd1d622e9ef16755bd70e4f7d6ffab7d0f09f1d3eead7d6f36c5", kill_on_drop: false }` [INFO] [stderr] Compiling proc-macro2 v1.0.43 [INFO] [stderr] Compiling unicode-ident v1.0.3 [INFO] [stderr] Compiling quote v1.0.21 [INFO] [stderr] Compiling syn v1.0.99 [INFO] [stderr] Compiling proc-macro-error-attr v1.0.4 [INFO] [stderr] Compiling serde_derive v1.0.144 [INFO] [stderr] Compiling proc-macro-error v1.0.4 [INFO] [stderr] Compiling serde v1.0.144 [INFO] [stderr] Compiling libc v0.2.132 [INFO] [stderr] Compiling serde_json v1.0.83 [INFO] [stderr] Checking itoa v1.0.3 [INFO] [stderr] Checking os_str_bytes v6.3.0 [INFO] [stderr] Checking ryu v1.0.11 [INFO] [stderr] Compiling heck v0.4.0 [INFO] [stderr] Checking hashbrown v0.12.3 [INFO] [stderr] Compiling indexmap v1.9.1 [INFO] [stderr] Checking termcolor v1.1.3 [INFO] [stderr] Checking once_cell v1.13.1 [INFO] [stderr] Checking strsim v0.10.0 [INFO] [stderr] Checking textwrap v0.15.0 [INFO] [stderr] Checking bitflags v1.3.2 [INFO] [stderr] Checking libloading v0.7.3 [INFO] [stderr] Checking bytes v1.2.1 [INFO] [stderr] Checking clap_lex v0.2.4 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Compiling thiserror-impl v1.0.32 [INFO] [stderr] Compiling clap_derive v3.2.17 [INFO] [stderr] Checking thiserror v1.0.32 [INFO] [stderr] Checking clap v3.2.17 [INFO] [stderr] Checking chrome-native v1.0.0 [INFO] [stderr] Checking chrome-native-rt v1.0.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.clone()` on a reference in this situation does nothing [INFO] [stdout] --> src/main.rs:53:34 [INFO] [stdout] | [INFO] [stdout] 53 | canonicalize(path.clone()) [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `Path` does not implement `Clone`, so calling `clone` on `&Path` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 53 - canonicalize(path.clone()) [INFO] [stdout] 53 + canonicalize(path) [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 15.24s [INFO] running `Command { std: "docker" "inspect" "d6290b9e9f5ecd1d622e9ef16755bd70e4f7d6ffab7d0f09f1d3eead7d6f36c5", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d6290b9e9f5ecd1d622e9ef16755bd70e4f7d6ffab7d0f09f1d3eead7d6f36c5", kill_on_drop: false }` [INFO] [stdout] d6290b9e9f5ecd1d622e9ef16755bd70e4f7d6ffab7d0f09f1d3eead7d6f36c5