[INFO] crate cleartor 0.1.6 is already in cache [INFO] checking cleartor-0.1.6 against try#a243773eaf3fedcd203f10ae4579e4f106bf7ccd for pr-68325 [INFO] extracting crate cleartor 0.1.6 into /workspace/builds/worker-2/source [INFO] validating manifest of crates.io crate cleartor 0.1.6 on toolchain a243773eaf3fedcd203f10ae4579e4f106bf7ccd [INFO] running `"/workspace/cargo-home/bin/cargo" "+a243773eaf3fedcd203f10ae4579e4f106bf7ccd" "read-manifest" "--manifest-path" "Cargo.toml"` [INFO] started tweaking crates.io crate cleartor 0.1.6 [INFO] finished tweaking crates.io crate cleartor 0.1.6 [INFO] tweaked toml for crates.io crate cleartor 0.1.6 written to /workspace/builds/worker-2/source/Cargo.toml [INFO] running `"/workspace/cargo-home/bin/cargo" "+a243773eaf3fedcd203f10ae4579e4f106bf7ccd" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update"` [INFO] running `"/workspace/cargo-home/bin/cargo" "+a243773eaf3fedcd203f10ae4579e4f106bf7ccd" "fetch" "--locked" "--manifest-path" "Cargo.toml"` [INFO] running `"docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "MAP_USER_ID=0" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--network" "none" "rustops/crates-build-env" "/opt/rustwide/cargo-home/bin/cargo" "+a243773eaf3fedcd203f10ae4579e4f106bf7ccd" "check" "--frozen" "--all" "--all-targets"` [INFO] [stdout] 9753a327956b2534a3879c866c5df939d94650d419e22dc6d57438b6d8f11f72 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `"docker" "start" "-a" "9753a327956b2534a3879c866c5df939d94650d419e22dc6d57438b6d8f11f72"` [INFO] [stderr] Checking want v0.2.0 [INFO] [stderr] Checking socks v0.3.2 [INFO] [stderr] Checking tokio-io v0.1.12 [INFO] [stderr] Checking toml v0.4.10 [INFO] [stderr] Checking simplelog v0.5.3 [INFO] [stderr] Checking tokio-reactor v0.1.11 [INFO] [stderr] Checking tokio-codec v0.1.1 [INFO] [stderr] Checking tokio-fs v0.1.6 [INFO] [stderr] Checking h2 v0.1.26 [INFO] [stderr] Checking tokio-tcp v0.1.3 [INFO] [stderr] Checking tokio-uds v0.2.5 [INFO] [stderr] Checking tokio-udp v0.1.5 [INFO] [stderr] Checking tokio v0.1.22 [INFO] [stderr] Checking hyper v0.12.35 [INFO] [stderr] Checking hyper-tls v0.3.2 [INFO] [stderr] Checking hyper-socks2 v0.2.1 [INFO] [stderr] Checking cleartor v0.1.6 (/opt/rustwide/workdir) [INFO] [stderr] warning: trait objects without an explicit `dyn` are deprecated [INFO] [stderr] --> src/main.rs:82:29 [INFO] [stderr] | [INFO] [stderr] 82 | fn main() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: use `dyn`: `dyn std::error::Error` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(bare_trait_objects)]` on by default [INFO] [stderr] [INFO] [stderr] warning: trait objects without an explicit `dyn` are deprecated [INFO] [stderr] --> src/main.rs:82:29 [INFO] [stderr] | [INFO] [stderr] 82 | fn main() -> Result<(), Box> { [INFO] [stderr] | ^^^^^^^^^^^^^^^^^ help: use `dyn`: `dyn std::error::Error` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(bare_trait_objects)]` on by default [INFO] [stderr] [INFO] [stderr] warning: cannot borrow `*headers` as mutable because it is also borrowed as immutable [INFO] [stderr] --> src/main.rs:182:21 [INFO] [stderr] | [INFO] [stderr] 180 | if let Some(location) = headers.get(header::LOCATION) { [INFO] [stderr] | ------- immutable borrow occurs here [INFO] [stderr] 181 | let location_str = location.to_str().unwrap(); [INFO] [stderr] 182 | headers.insert(header::LOCATION, location_str.replace(&*route.onion, &*route.domain).parse().unwrap()); [INFO] [stderr] | ^^^^^^^ ------------ immutable borrow later used here [INFO] [stderr] | | [INFO] [stderr] | mutable borrow occurs here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stderr] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stderr] = note: for more information, see issue #59159 [INFO] [stderr] [INFO] [stderr] warning: cannot borrow `*headers` as mutable because it is also borrowed as immutable [INFO] [stderr] --> src/main.rs:182:21 [INFO] [stderr] | [INFO] [stderr] 180 | if let Some(location) = headers.get(header::LOCATION) { [INFO] [stderr] | ------- immutable borrow occurs here [INFO] [stderr] 181 | let location_str = location.to_str().unwrap(); [INFO] [stderr] 182 | headers.insert(header::LOCATION, location_str.replace(&*route.onion, &*route.domain).parse().unwrap()); [INFO] [stderr] | ^^^^^^^ ------------ immutable borrow later used here [INFO] [stderr] | | [INFO] [stderr] | mutable borrow occurs here [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stderr] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stderr] = note: for more information, see issue #59159 [INFO] [stderr] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 8.49s [INFO] running `"docker" "inspect" "9753a327956b2534a3879c866c5df939d94650d419e22dc6d57438b6d8f11f72"` [INFO] running `"docker" "rm" "-f" "9753a327956b2534a3879c866c5df939d94650d419e22dc6d57438b6d8f11f72"` [INFO] [stdout] 9753a327956b2534a3879c866c5df939d94650d419e22dc6d57438b6d8f11f72