[INFO] cloning repository https://github.com/knalli/aoc2022 [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/knalli/aoc2022" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fknalli%2Faoc2022", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fknalli%2Faoc2022'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] eab8e02ca257113b3de91ffa1a4d8890e380992b [INFO] building knalli/aoc2022 against master#11663cd3bfefef7d34e8f0892c250bf698049392+rustflags=-Dtail-expr-drop-order for pr-134523 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fknalli%2Faoc2022" "/workspace/builds/worker-7-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-7-tc1/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/knalli/aoc2022 on toolchain 11663cd3bfefef7d34e8f0892c250bf698049392 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/knalli/aoc2022 [INFO] finished tweaking git repo https://github.com/knalli/aoc2022 [INFO] tweaked toml for git repo https://github.com/knalli/aoc2022 written to /workspace/builds/worker-7-tc1/source/Cargo.toml [INFO] crate git repo https://github.com/knalli/aoc2022 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] e0dcb322acfade9d9730b7b60c59f8b6a46ab8cec2a52e9712396c2549ad30d7 [INFO] running `Command { std: "docker" "start" "-a" "e0dcb322acfade9d9730b7b60c59f8b6a46ab8cec2a52e9712396c2549ad30d7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "e0dcb322acfade9d9730b7b60c59f8b6a46ab8cec2a52e9712396c2549ad30d7", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e0dcb322acfade9d9730b7b60c59f8b6a46ab8cec2a52e9712396c2549ad30d7", kill_on_drop: false }` [INFO] [stdout] e0dcb322acfade9d9730b7b60c59f8b6a46ab8cec2a52e9712396c2549ad30d7 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] ae4cc96448a211e705b038f64478a636a55fb5e5208a4b014eba715c53c36d84 [INFO] running `Command { std: "docker" "start" "-a" "ae4cc96448a211e705b038f64478a636a55fb5e5208a4b014eba715c53c36d84", kill_on_drop: false }` [INFO] [stderr] Compiling autocfg v1.1.0 [INFO] [stderr] Compiling crossbeam-utils v0.8.14 [INFO] [stderr] Compiling cfg-if v1.0.0 [INFO] [stderr] Compiling libc v0.2.138 [INFO] [stderr] Compiling memchr v2.5.0 [INFO] [stderr] Compiling scopeguard v1.1.0 [INFO] [stderr] Compiling rayon-core v1.10.1 [INFO] [stderr] Compiling either v1.8.0 [INFO] [stderr] Compiling anyhow v1.0.68 [INFO] [stderr] Compiling regex-syntax v0.6.28 [INFO] [stderr] Compiling itertools v0.10.5 [INFO] [stderr] Compiling memoffset v0.7.1 [INFO] [stderr] Compiling crossbeam-epoch v0.9.13 [INFO] [stderr] Compiling aho-corasick v0.7.20 [INFO] [stderr] Compiling crossbeam-channel v0.5.6 [INFO] [stderr] Compiling num_cpus v1.14.0 [INFO] [stderr] Compiling crossbeam-deque v0.8.2 [INFO] [stderr] Compiling rayon v1.6.1 [INFO] [stderr] Compiling regex v1.7.0 [INFO] [stderr] Compiling aoc2022 v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/aoc2022/day23/part1.rs:62:13 [INFO] [stdout] | [INFO] [stdout] 62 | let mut elf = map.get_mut(&pos).unwrap(); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.borrow()` on a reference in this situation does nothing [INFO] [stdout] --> src/aoc2022/day07/fs.rs:100:27 [INFO] [stdout] | [INFO] [stdout] 100 | let item_fd = item.borrow().fd; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `day07::fs::File` does not implement `Borrow`, so calling `borrow` on `&day07::fs::File` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 100 - let item_fd = item.borrow().fd; [INFO] [stdout] 100 + let item_fd = item.fd; [INFO] [stdout] | [INFO] [stdout] help: if you meant to clone `day07::fs::File`, implement `Clone` for it [INFO] [stdout] | [INFO] [stdout] 169 + #[derive(Clone)] [INFO] [stdout] 170 | pub struct File { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: using `.clone()` on a double reference, which returns `&Pixel` instead of cloning the inner type [INFO] [stdout] --> src/aoc2022/day14/part1.rs:34:24 [INFO] [stdout] | [INFO] [stdout] 34 | match pixel.clone() { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(suspicious_double_ref_op)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: using `.clone()` on a double reference, which returns `&Pixel` instead of cloning the inner type [INFO] [stdout] --> src/aoc2022/day14/part2.rs:40:24 [INFO] [stdout] | [INFO] [stdout] 40 | match pixel.clone() { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 13.54s [INFO] running `Command { std: "docker" "inspect" "ae4cc96448a211e705b038f64478a636a55fb5e5208a4b014eba715c53c36d84", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ae4cc96448a211e705b038f64478a636a55fb5e5208a4b014eba715c53c36d84", kill_on_drop: false }` [INFO] [stdout] ae4cc96448a211e705b038f64478a636a55fb5e5208a4b014eba715c53c36d84 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] bf14c1cc046daf022df469d49f2fa658c7cf7575a30b709b9d150c1c8cacfb82 [INFO] running `Command { std: "docker" "start" "-a" "bf14c1cc046daf022df469d49f2fa658c7cf7575a30b709b9d150c1c8cacfb82", kill_on_drop: false }` [INFO] [stderr] Compiling aoc2022 v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: variable does not need to be mutable [INFO] [stdout] --> src/aoc2022/day23/part1.rs:62:13 [INFO] [stdout] | [INFO] [stdout] 62 | let mut elf = map.get_mut(&pos).unwrap(); [INFO] [stdout] | ----^^^ [INFO] [stdout] | | [INFO] [stdout] | help: remove this `mut` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_mut)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: call to `.borrow()` on a reference in this situation does nothing [INFO] [stdout] --> src/aoc2022/day07/fs.rs:100:27 [INFO] [stdout] | [INFO] [stdout] 100 | let item_fd = item.borrow().fd; [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: the type `day07::fs::File` does not implement `Borrow`, so calling `borrow` on `&day07::fs::File` copies the reference, which does not do anything and can be removed [INFO] [stdout] = note: `#[warn(noop_method_call)]` on by default [INFO] [stdout] help: remove this redundant call [INFO] [stdout] | [INFO] [stdout] 100 - let item_fd = item.borrow().fd; [INFO] [stdout] 100 + let item_fd = item.fd; [INFO] [stdout] | [INFO] [stdout] help: if you meant to clone `day07::fs::File`, implement `Clone` for it [INFO] [stdout] | [INFO] [stdout] 169 + #[derive(Clone)] [INFO] [stdout] 170 | pub struct File { [INFO] [stdout] | [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: using `.clone()` on a double reference, which returns `&Pixel` instead of cloning the inner type [INFO] [stdout] --> src/aoc2022/day14/part1.rs:34:24 [INFO] [stdout] | [INFO] [stdout] 34 | match pixel.clone() { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(suspicious_double_ref_op)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: using `.clone()` on a double reference, which returns `&Pixel` instead of cloning the inner type [INFO] [stdout] --> src/aoc2022/day14/part2.rs:40:24 [INFO] [stdout] | [INFO] [stdout] 40 | match pixel.clone() { [INFO] [stdout] | ^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 1.24s [INFO] running `Command { std: "docker" "inspect" "bf14c1cc046daf022df469d49f2fa658c7cf7575a30b709b9d150c1c8cacfb82", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "bf14c1cc046daf022df469d49f2fa658c7cf7575a30b709b9d150c1c8cacfb82", kill_on_drop: false }` [INFO] [stdout] bf14c1cc046daf022df469d49f2fa658c7cf7575a30b709b9d150c1c8cacfb82