[INFO] cloning repository https://github.com/bestrauc/memory_map [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/bestrauc/memory_map" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] c98094277c91c1c68245da02b007a91c7299cafb [INFO] checking bestrauc/memory_map against try#b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 for pr-78363 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map" "/workspace/builds/worker-2/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-2/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/bestrauc/memory_map on toolchain b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8 [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "read-manifest" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/bestrauc/memory_map [INFO] finished tweaking git repo https://github.com/bestrauc/memory_map [INFO] tweaked toml for git repo https://github.com/bestrauc/memory_map written to /workspace/builds/worker-2/source/Cargo.toml [INFO] crate git repo https://github.com/bestrauc/memory_map already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "fetch" "--locked" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 77a851557f642b9e216b0c22beeb91e3c099bfed177fba367cebf2f87793c84b [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "77a851557f642b9e216b0c22beeb91e3c099bfed177fba367cebf2f87793c84b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "77a851557f642b9e216b0c22beeb91e3c099bfed177fba367cebf2f87793c84b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "77a851557f642b9e216b0c22beeb91e3c099bfed177fba367cebf2f87793c84b", kill_on_drop: false }` [INFO] [stdout] 77a851557f642b9e216b0c22beeb91e3c099bfed177fba367cebf2f87793c84b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "rustops/crates-build-env@sha256:d92eaeed33fa75130ca1ee6c8a01d1ffb62bac859dfdfb3450e3e5d1c0146529" "/opt/rustwide/cargo-home/bin/cargo" "+b2c2190fa7bf856bb0ed5e8806266e3a2135c6f8" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] e2caab3d779dffc54a3a209d96ff3a5ae2608e768f7086231dbb926a8d0ef62f [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "e2caab3d779dffc54a3a209d96ff3a5ae2608e768f7086231dbb926a8d0ef62f", kill_on_drop: false }` [INFO] [stderr] Checking byteorder v1.2.3 [INFO] [stderr] Checking bitflags v1.0.3 [INFO] [stderr] Checking memory_map v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1.86s [INFO] running `Command { std: "docker" "inspect" "e2caab3d779dffc54a3a209d96ff3a5ae2608e768f7086231dbb926a8d0ef62f", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "e2caab3d779dffc54a3a209d96ff3a5ae2608e768f7086231dbb926a8d0ef62f", kill_on_drop: false }` [INFO] [stdout] e2caab3d779dffc54a3a209d96ff3a5ae2608e768f7086231dbb926a8d0ef62f