[INFO] cloning repository https://github.com/bestrauc/memory_map [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/bestrauc/memory_map" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] c98094277c91c1c68245da02b007a91c7299cafb [INFO] checking bestrauc/memory_map against try#b20a093d9fb1ffaa04ae9852cb034864a992bafd for pr-85073 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fbestrauc%2Fmemory_map" "/workspace/builds/worker-5/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-5/source'... [INFO] [stderr] done. [INFO] validating manifest of git repo https://github.com/bestrauc/memory_map on toolchain b20a093d9fb1ffaa04ae9852cb034864a992bafd [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b20a093d9fb1ffaa04ae9852cb034864a992bafd" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking git repo https://github.com/bestrauc/memory_map [INFO] finished tweaking git repo https://github.com/bestrauc/memory_map [INFO] tweaked toml for git repo https://github.com/bestrauc/memory_map written to /workspace/builds/worker-5/source/Cargo.toml [INFO] crate git repo https://github.com/bestrauc/memory_map already has a lockfile, it will not be regenerated [INFO] running `Command { std: "/workspace/cargo-home/bin/cargo" "+b20a093d9fb1ffaa04ae9852cb034864a992bafd" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+b20a093d9fb1ffaa04ae9852cb034864a992bafd" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] a37f3a57e1e2294bf7e4e67038a58a446bf4ac64addd29fa93146ee08556732b [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "a37f3a57e1e2294bf7e4e67038a58a446bf4ac64addd29fa93146ee08556732b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "a37f3a57e1e2294bf7e4e67038a58a446bf4ac64addd29fa93146ee08556732b", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a37f3a57e1e2294bf7e4e67038a58a446bf4ac64addd29fa93146ee08556732b", kill_on_drop: false }` [INFO] [stdout] a37f3a57e1e2294bf7e4e67038a58a446bf4ac64addd29fa93146ee08556732b [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-5/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:20528e8c29e4536546f0102ce88568b16ea7538393a33fcca951030f7af10457" "/opt/rustwide/cargo-home/bin/cargo" "+b20a093d9fb1ffaa04ae9852cb034864a992bafd" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] ab9cc84f2b5815b7d16a306ce6a82919ce9a3aab481b564bfe9b0652d4e189d6 [INFO] [stderr] WARNING: Your kernel does not support swap limit capabilities or the cgroup is not mounted. Memory limited without swap. [INFO] running `Command { std: "docker" "start" "-a" "ab9cc84f2b5815b7d16a306ce6a82919ce9a3aab481b564bfe9b0652d4e189d6", kill_on_drop: false }` [INFO] [stderr] Checking bitflags v1.0.3 [INFO] [stderr] Checking byteorder v1.2.3 [INFO] [stderr] Checking memory_map v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(deprecated)]` on by default [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: use of deprecated macro `try`: use the `?` operator instead [INFO] [stdout] --> src/proc_utils/process/memory.rs:16:1 [INFO] [stdout] | [INFO] [stdout] 16 | / bitflags! { [INFO] [stdout] 17 | | /// Memory region permissions, as they are mapped by `mmap` [INFO] [stdout] 18 | | /// [INFO] [stdout] 19 | | /// if `SHARED` is not set, then the visibility of the mapping is `PRIVATE` [INFO] [stdout] ... | [INFO] [stdout] 25 | | } [INFO] [stdout] 26 | | } [INFO] [stdout] | |_^ [INFO] [stdout] | [INFO] [stdout] = note: this warning originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info) [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 3 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished dev [unoptimized + debuginfo] target(s) in 1.01s [INFO] running `Command { std: "docker" "inspect" "ab9cc84f2b5815b7d16a306ce6a82919ce9a3aab481b564bfe9b0652d4e189d6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ab9cc84f2b5815b7d16a306ce6a82919ce9a3aab481b564bfe9b0652d4e189d6", kill_on_drop: false }` [INFO] [stdout] ab9cc84f2b5815b7d16a306ce6a82919ce9a3aab481b564bfe9b0652d4e189d6