[INFO] fetching crate rbtset 1.0.1... [INFO] checking rbtset-1.0.1 against master#119d2a1a98fe87d4ae6cabf12134a0ef2fb95851 for pr-75180 [INFO] extracting crate rbtset 1.0.1 into /workspace/builds/worker-9/source [INFO] validating manifest of crates.io crate rbtset 1.0.1 on toolchain 119d2a1a98fe87d4ae6cabf12134a0ef2fb95851 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+119d2a1a98fe87d4ae6cabf12134a0ef2fb95851" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate rbtset 1.0.1 [INFO] finished tweaking crates.io crate rbtset 1.0.1 [INFO] tweaked toml for crates.io crate rbtset 1.0.1 written to /workspace/builds/worker-9/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+119d2a1a98fe87d4ae6cabf12134a0ef2fb95851" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+119d2a1a98fe87d4ae6cabf12134a0ef2fb95851" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+119d2a1a98fe87d4ae6cabf12134a0ef2fb95851" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] a5259e0e5ca4b8cdbfb7393080cc48f82a69733681cf2db5017f0798f02b9e40 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "a5259e0e5ca4b8cdbfb7393080cc48f82a69733681cf2db5017f0798f02b9e40", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "a5259e0e5ca4b8cdbfb7393080cc48f82a69733681cf2db5017f0798f02b9e40", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a5259e0e5ca4b8cdbfb7393080cc48f82a69733681cf2db5017f0798f02b9e40", kill_on_drop: false }` [INFO] [stdout] a5259e0e5ca4b8cdbfb7393080cc48f82a69733681cf2db5017f0798f02b9e40 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-9/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:a636fd89d022f18117e1dc8fb37a0a009933cdbbe082814857f0e2024962d47c" "/opt/rustwide/cargo-home/bin/cargo" "+119d2a1a98fe87d4ae6cabf12134a0ef2fb95851" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] [stdout] 5159f3f32c23317f4659bb8415439a42faa9071369edc5e95283f8ca1fc106ca [INFO] running `Command { std: "docker" "start" "-a" "5159f3f32c23317f4659bb8415439a42faa9071369edc5e95283f8ca1fc106ca", kill_on_drop: false }` [INFO] [stderr] Compiling autocfg v1.0.1 [INFO] [stderr] Checking rand_core v0.4.2 [INFO] [stderr] Compiling autocfg v0.1.7 [INFO] [stderr] Compiling libc v0.2.76 [INFO] [stderr] Compiling serde v1.0.115 [INFO] [stderr] Compiling ryu v1.0.5 [INFO] [stderr] Compiling rayon-core v1.8.0 [INFO] [stderr] Checking itoa v0.4.6 [INFO] [stderr] Compiling serde_json v1.0.57 [INFO] [stderr] Checking either v1.6.0 [INFO] [stderr] Checking same-file v1.0.6 [INFO] [stderr] Checking rbtset v1.0.1 (/opt/rustwide/workdir) [INFO] [stderr] Checking csv-core v0.1.10 [INFO] [stderr] Checking clap v2.33.3 [INFO] [stderr] Checking regex-automata v0.1.9 [INFO] [stderr] Compiling cast v0.2.3 [INFO] [stderr] Checking walkdir v2.3.1 [INFO] [stdout] warning: cannot borrow `*self` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/tree.rs:237:13 [INFO] [stdout] | [INFO] [stdout] 236 | let node = if let Some(ref root) = self.root { [INFO] [stdout] | -------- immutable borrow occurs here [INFO] [stdout] 237 | self.insert_from(root.duplicate(), data) [INFO] [stdout] | ^^^^ ---- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking itertools v0.8.2 [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Checking rand_core v0.3.1 [INFO] [stderr] Checking rand_jitter v0.1.4 [INFO] [stderr] Checking rand_xoshiro v0.1.0 [INFO] [stderr] Checking rand_hc v0.1.0 [INFO] [stderr] Checking rand_isaac v0.1.1 [INFO] [stderr] Checking rand_xorshift v0.1.1 [INFO] [stderr] Compiling crossbeam-utils v0.7.2 [INFO] [stderr] Compiling memoffset v0.5.5 [INFO] [stderr] Compiling crossbeam-epoch v0.8.2 [INFO] [stderr] Compiling rayon v1.4.0 [INFO] [stderr] Compiling num-traits v0.2.12 [INFO] [stderr] Compiling rand_pcg v0.1.2 [INFO] [stderr] Compiling rand_chacha v0.1.1 [INFO] [stderr] Compiling rand v0.6.5 [INFO] [stderr] Checking num_cpus v1.13.0 [INFO] [stderr] Checking rand_os v0.1.3 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking crossbeam-channel v0.4.3 [INFO] [stderr] Checking criterion-plot v0.3.1 [INFO] [stderr] Checking crossbeam-deque v0.7.3 [INFO] [stderr] Checking bstr v0.2.13 [INFO] [stderr] Checking csv v1.1.3 [INFO] [stderr] Checking tinytemplate v1.1.0 [INFO] [stderr] Checking criterion v0.2.11 [INFO] [stdout] warning: cannot borrow `*self` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/tree.rs:237:13 [INFO] [stdout] | [INFO] [stdout] 236 | let node = if let Some(ref root) = self.root { [INFO] [stdout] | -------- immutable borrow occurs here [INFO] [stdout] 237 | self.insert_from(root.duplicate(), data) [INFO] [stdout] | ^^^^ ---- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 38.26s [INFO] running `Command { std: "docker" "inspect" "5159f3f32c23317f4659bb8415439a42faa9071369edc5e95283f8ca1fc106ca", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "5159f3f32c23317f4659bb8415439a42faa9071369edc5e95283f8ca1fc106ca", kill_on_drop: false }` [INFO] [stdout] 5159f3f32c23317f4659bb8415439a42faa9071369edc5e95283f8ca1fc106ca