[INFO] fetching crate goto-rs 0.3.0... [INFO] checking goto-rs-0.3.0 against master#7b3a7819371cef92a187e9bac8f7810ccde15216 for pr-74846 [INFO] extracting crate goto-rs 0.3.0 into /workspace/builds/worker-4/source [INFO] validating manifest of crates.io crate goto-rs 0.3.0 on toolchain 7b3a7819371cef92a187e9bac8f7810ccde15216 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+7b3a7819371cef92a187e9bac8f7810ccde15216" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate goto-rs 0.3.0 [INFO] finished tweaking crates.io crate goto-rs 0.3.0 [INFO] tweaked toml for crates.io crate goto-rs 0.3.0 written to /workspace/builds/worker-4/source/Cargo.toml [INFO] crate crates.io crate goto-rs 0.3.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+7b3a7819371cef92a187e9bac8f7810ccde15216" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+7b3a7819371cef92a187e9bac8f7810ccde15216" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] a6829ec408843cce1d81f184d93b986cc74fd60ce697672fca730d6ae843108f [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "a6829ec408843cce1d81f184d93b986cc74fd60ce697672fca730d6ae843108f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "a6829ec408843cce1d81f184d93b986cc74fd60ce697672fca730d6ae843108f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a6829ec408843cce1d81f184d93b986cc74fd60ce697672fca730d6ae843108f", kill_on_drop: false }` [INFO] [stdout] a6829ec408843cce1d81f184d93b986cc74fd60ce697672fca730d6ae843108f [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+7b3a7819371cef92a187e9bac8f7810ccde15216" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] c3c510d10b4f56013064fa0e84a5d23769f4a1b977d24830a818bb0bcc686fd3 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "c3c510d10b4f56013064fa0e84a5d23769f4a1b977d24830a818bb0bcc686fd3", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.69 [INFO] [stderr] Compiling serde v1.0.106 [INFO] [stderr] Compiling bitflags v1.2.1 [INFO] [stderr] Checking lazy_static v1.4.0 [INFO] [stderr] Checking ansi_term v0.11.0 [INFO] [stderr] Checking strsim v0.8.0 [INFO] [stderr] Checking either v1.5.3 [INFO] [stderr] Checking csv-core v0.1.10 [INFO] [stderr] Checking itertools v0.9.0 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking clap v2.33.0 [INFO] [stderr] Checking bstr v0.2.12 [INFO] [stderr] Checking csv v1.1.3 [INFO] [stderr] Checking goto-rs v0.3.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated item 'std::env::home_dir': This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:17:11 [INFO] [stdout] | [INFO] [stdout] 17 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated item 'std::env::home_dir': This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:41:11 [INFO] [stdout] | [INFO] [stdout] 41 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto/db.txt")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated item 'std::env::home_dir': This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:17:11 [INFO] [stdout] | [INFO] [stdout] 17 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated item 'std::env::home_dir': This function's behavior is unexpected and probably not what you want. Consider using a crate from crates.io instead. [INFO] [stdout] --> src/db.rs:41:11 [INFO] [stdout] | [INFO] [stdout] 41 | match env::home_dir().map(|p| format!("{}/{}", p.display(), ".config/goto/db.txt")) { [INFO] [stdout] | ^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: irrefutable while-let pattern [INFO] [stdout] --> src/switch.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | / while let opt_char = alias_ptr.nth(0) { [INFO] [stdout] 69 | | match opt_char { [INFO] [stdout] 70 | | None => return vec, [INFO] [stdout] 71 | | Some(alias_c) => { [INFO] [stdout] ... | [INFO] [stdout] 79 | | idx += 1; [INFO] [stdout] 80 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(irrefutable_let_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: irrefutable while-let pattern [INFO] [stdout] --> src/switch.rs:68:9 [INFO] [stdout] | [INFO] [stdout] 68 | / while let opt_char = alias_ptr.nth(0) { [INFO] [stdout] 69 | | match opt_char { [INFO] [stdout] 70 | | None => return vec, [INFO] [stdout] 71 | | Some(alias_c) => { [INFO] [stdout] ... | [INFO] [stdout] 79 | | idx += 1; [INFO] [stdout] 80 | | } [INFO] [stdout] | |_________^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(irrefutable_let_patterns)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*db` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/indexer.rs:101:17 [INFO] [stdout] | [INFO] [stdout] 95 | match db.get(&k) { [INFO] [stdout] | -- immutable borrow occurs here [INFO] [stdout] ... [INFO] [stdout] 101 | db.insert(existing, v_existing.to_string()); [INFO] [stdout] | ^^ ---------- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: cannot borrow `*db` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/indexer.rs:101:17 [INFO] [stdout] | [INFO] [stdout] 95 | match db.get(&k) { [INFO] [stdout] | -- immutable borrow occurs here [INFO] [stdout] ... [INFO] [stdout] 101 | db.insert(existing, v_existing.to_string()); [INFO] [stdout] | ^^ ---------- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 17.22s [INFO] running `Command { std: "docker" "inspect" "c3c510d10b4f56013064fa0e84a5d23769f4a1b977d24830a818bb0bcc686fd3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "c3c510d10b4f56013064fa0e84a5d23769f4a1b977d24830a818bb0bcc686fd3", kill_on_drop: false }` [INFO] [stdout] c3c510d10b4f56013064fa0e84a5d23769f4a1b977d24830a818bb0bcc686fd3