[INFO] fetching crate rbtset 1.0.1... [INFO] checking rbtset-1.0.1 against try#f47dd4da3ae8c32c9e65d307bfe640b143e674df for pr-77526 [INFO] extracting crate rbtset 1.0.1 into /workspace/builds/worker-12/source [INFO] validating manifest of crates.io crate rbtset 1.0.1 on toolchain f47dd4da3ae8c32c9e65d307bfe640b143e674df [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+f47dd4da3ae8c32c9e65d307bfe640b143e674df" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking crates.io crate rbtset 1.0.1 [INFO] finished tweaking crates.io crate rbtset 1.0.1 [INFO] tweaked toml for crates.io crate rbtset 1.0.1 written to /workspace/builds/worker-12/source/Cargo.toml [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+f47dd4da3ae8c32c9e65d307bfe640b143e674df" "generate-lockfile" "--manifest-path" "Cargo.toml" "-Zno-index-update", kill_on_drop: false }` [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+f47dd4da3ae8c32c9e65d307bfe640b143e674df" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-12/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-12/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+f47dd4da3ae8c32c9e65d307bfe640b143e674df" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 26e7d7fc54fc1cb73c9d434f06d145f46e2953e219e1c20a7ad7643d53612c21 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "26e7d7fc54fc1cb73c9d434f06d145f46e2953e219e1c20a7ad7643d53612c21", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "26e7d7fc54fc1cb73c9d434f06d145f46e2953e219e1c20a7ad7643d53612c21", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "26e7d7fc54fc1cb73c9d434f06d145f46e2953e219e1c20a7ad7643d53612c21", kill_on_drop: false }` [INFO] [stdout] 26e7d7fc54fc1cb73c9d434f06d145f46e2953e219e1c20a7ad7643d53612c21 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-12/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-12/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+f47dd4da3ae8c32c9e65d307bfe640b143e674df" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 0c6a327850d0e9acfd1ae630df597642b4186fb3d72f3876447f73bfbc72e523 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "0c6a327850d0e9acfd1ae630df597642b4186fb3d72f3876447f73bfbc72e523", kill_on_drop: false }` [INFO] [stderr] Compiling semver-parser v0.7.0 [INFO] [stderr] Compiling memchr v2.3.3 [INFO] [stderr] Compiling rayon-core v1.8.1 [INFO] [stderr] Checking either v1.6.1 [INFO] [stderr] Checking rbtset v1.0.1 (/opt/rustwide/workdir) [INFO] [stderr] Compiling crossbeam-utils v0.7.2 [INFO] [stderr] Compiling memoffset v0.5.6 [INFO] [stderr] Compiling crossbeam-epoch v0.8.2 [INFO] [stderr] Compiling rayon v1.4.1 [INFO] [stderr] Compiling num-traits v0.2.12 [INFO] [stderr] Checking num_cpus v1.13.0 [INFO] [stderr] Checking atty v0.2.14 [INFO] [stderr] Checking clap v2.33.3 [INFO] [stderr] Checking serde_json v1.0.58 [INFO] [stderr] Checking regex-automata v0.1.9 [INFO] [stderr] Checking rand_xoshiro v0.1.0 [INFO] [stderr] Checking itertools v0.8.2 [INFO] [stdout] warning: cannot borrow `*self` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/tree.rs:237:13 [INFO] [stdout] | [INFO] [stdout] 236 | let node = if let Some(ref root) = self.root { [INFO] [stdout] | -------- immutable borrow occurs here [INFO] [stdout] 237 | self.insert_from(root.duplicate(), data) [INFO] [stdout] | ^^^^ ---- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling semver v0.9.0 [INFO] [stderr] Compiling rustc_version v0.2.3 [INFO] [stderr] Checking csv-core v0.1.10 [INFO] [stderr] Checking bstr v0.2.13 [INFO] [stderr] Checking crossbeam-channel v0.4.4 [INFO] [stderr] Compiling cast v0.2.3 [INFO] [stderr] Checking crossbeam-deque v0.7.3 [INFO] [stderr] Checking criterion-plot v0.3.1 [INFO] [stderr] Checking tinytemplate v1.1.0 [INFO] [stderr] Checking csv v1.1.3 [INFO] [stderr] Checking criterion v0.2.11 [INFO] [stdout] warning: cannot borrow `*self` as mutable because it is also borrowed as immutable [INFO] [stdout] --> src/tree.rs:237:13 [INFO] [stdout] | [INFO] [stdout] 236 | let node = if let Some(ref root) = self.root { [INFO] [stdout] | -------- immutable borrow occurs here [INFO] [stdout] 237 | self.insert_from(root.duplicate(), data) [INFO] [stdout] | ^^^^ ---- immutable borrow later used here [INFO] [stdout] | | [INFO] [stdout] | mutable borrow occurs here [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(mutable_borrow_reservation_conflict)]` on by default [INFO] [stdout] = warning: this borrowing pattern was not meant to be accepted, and may become a hard error in the future [INFO] [stdout] = note: for more information, see issue #59159 [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 1 warning emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 27.98s [INFO] running `Command { std: "docker" "inspect" "0c6a327850d0e9acfd1ae630df597642b4186fb3d72f3876447f73bfbc72e523", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "0c6a327850d0e9acfd1ae630df597642b4186fb3d72f3876447f73bfbc72e523", kill_on_drop: false }` [INFO] [stdout] 0c6a327850d0e9acfd1ae630df597642b4186fb3d72f3876447f73bfbc72e523