[INFO] fetching crate state_machine_parser 0.1.0... [INFO] building state_machine_parser-0.1.0 against master#11663cd3bfefef7d34e8f0892c250bf698049392+rustflags=-Dtail-expr-drop-order for pr-134523 [INFO] extracting crate state_machine_parser 0.1.0 into /workspace/builds/worker-1-tc1/source [INFO] validating manifest of crates.io crate state_machine_parser 0.1.0 on toolchain 11663cd3bfefef7d34e8f0892c250bf698049392 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate state_machine_parser 0.1.0 [INFO] finished tweaking crates.io crate state_machine_parser 0.1.0 [INFO] tweaked toml for crates.io crate state_machine_parser 0.1.0 written to /workspace/builds/worker-1-tc1/source/Cargo.toml [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] b4a833f38cd5fb712b853b6c5c575d4aeb159021bb71080c76d8176df437a03d [INFO] running `Command { std: "docker" "start" "-a" "b4a833f38cd5fb712b853b6c5c575d4aeb159021bb71080c76d8176df437a03d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "b4a833f38cd5fb712b853b6c5c575d4aeb159021bb71080c76d8176df437a03d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b4a833f38cd5fb712b853b6c5c575d4aeb159021bb71080c76d8176df437a03d", kill_on_drop: false }` [INFO] [stdout] b4a833f38cd5fb712b853b6c5c575d4aeb159021bb71080c76d8176df437a03d [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 51574ad18dd4a0d2b135b65f3b1cc42e253bbba12411943b01a938886d0a541d [INFO] running `Command { std: "docker" "start" "-a" "51574ad18dd4a0d2b135b65f3b1cc42e253bbba12411943b01a938886d0a541d", kill_on_drop: false }` [INFO] [stderr] Compiling state_machine_parser v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused imports: `MatchRecord`, `ParseError`, and `self` [INFO] [stdout] --> src/bnf_rules_compiler.rs:3:38 [INFO] [stdout] | [INFO] [stdout] 3 | use crate::{error::{BNFCompileError, ParseError}, state_machine::{self, ASTNode, MatchRecord, StateMachineParser, State, StateAction}, To... [INFO] [stdout] | ^^^^^^^^^^ ^^^^ ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `marker::PhantomData` [INFO] [stdout] --> src/state_machine.rs:1:33 [INFO] [stdout] | [INFO] [stdout] 1 | use std::{collections::HashMap, marker::PhantomData}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::collections::HashMap` [INFO] [stdout] --> src/lib.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | use std::collections::HashMap; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] help: if this is a test module, consider adding a `#[cfg(test)]` to the containing module [INFO] [stdout] --> src/lib.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | mod tests { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `StateMachineParser`, `TokenType`, `Token`, `compile_bnf_rules`, and `debug_print_match_record` [INFO] [stdout] --> src/lib.rs:23:17 [INFO] [stdout] | [INFO] [stdout] 23 | use crate::{compile_bnf_rules, debug_print_match_record, StateMachineParser, Token, TokenType}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^ ^^^^^ ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] help: if this is a test module, consider adding a `#[cfg(test)]` to the containing module [INFO] [stdout] --> src/lib.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | mod tests { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:83:14 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `traceback_records` [INFO] [stdout] --> src/state_machine.rs:83:34 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_traceback_records` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `rule_call_record` [INFO] [stdout] --> src/state_machine.rs:83:53 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_rule_call_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `match_record` [INFO] [stdout] --> src/state_machine.rs:83:71 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_match_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:129:14 [INFO] [stdout] | [INFO] [stdout] 129 | let (start_rule, tokens, traceback_records, rule_call_records, match_records) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.16s [INFO] running `Command { std: "docker" "inspect" "51574ad18dd4a0d2b135b65f3b1cc42e253bbba12411943b01a938886d0a541d", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "51574ad18dd4a0d2b135b65f3b1cc42e253bbba12411943b01a938886d0a541d", kill_on_drop: false }` [INFO] [stdout] 51574ad18dd4a0d2b135b65f3b1cc42e253bbba12411943b01a938886d0a541d [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d2e99cedb02e66160263680fd6837a895601f4db71410c91b25aa5ac66b90aa9 [INFO] running `Command { std: "docker" "start" "-a" "d2e99cedb02e66160263680fd6837a895601f4db71410c91b25aa5ac66b90aa9", kill_on_drop: false }` [INFO] [stdout] warning: unused imports: `MatchRecord`, `ParseError`, and `self` [INFO] [stdout] --> src/bnf_rules_compiler.rs:3:38 [INFO] [stdout] | [INFO] [stdout] 3 | use crate::{error::{BNFCompileError, ParseError}, state_machine::{self, ASTNode, MatchRecord, StateMachineParser, State, StateAction}, To... [INFO] [stdout] | ^^^^^^^^^^ ^^^^ ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `marker::PhantomData` [INFO] [stdout] --> src/state_machine.rs:1:33 [INFO] [stdout] | [INFO] [stdout] 1 | use std::{collections::HashMap, marker::PhantomData}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `std::collections::HashMap` [INFO] [stdout] --> src/lib.rs:21:9 [INFO] [stdout] | [INFO] [stdout] 21 | use std::collections::HashMap; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] help: if this is a test module, consider adding a `#[cfg(test)]` to the containing module [INFO] [stdout] --> src/lib.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | mod tests { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `StateMachineParser`, `TokenType`, `Token`, `compile_bnf_rules`, and `debug_print_match_record` [INFO] [stdout] --> src/lib.rs:23:17 [INFO] [stdout] | [INFO] [stdout] 23 | use crate::{compile_bnf_rules, debug_print_match_record, StateMachineParser, Token, TokenType}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^ ^^^^^ ^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] help: if this is a test module, consider adding a `#[cfg(test)]` to the containing module [INFO] [stdout] --> src/lib.rs:18:1 [INFO] [stdout] | [INFO] [stdout] 18 | mod tests { [INFO] [stdout] | ^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Compiling state_machine_parser v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:83:14 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `traceback_records` [INFO] [stdout] --> src/state_machine.rs:83:34 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_traceback_records` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `rule_call_record` [INFO] [stdout] --> src/state_machine.rs:83:53 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_rule_call_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `match_record` [INFO] [stdout] --> src/state_machine.rs:83:71 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_match_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:129:14 [INFO] [stdout] | [INFO] [stdout] 129 | let (start_rule, tokens, traceback_records, rule_call_records, match_records) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused imports: `MatchRecord`, `ParseError`, and `self` [INFO] [stdout] --> src/bnf_rules_compiler.rs:3:38 [INFO] [stdout] | [INFO] [stdout] 3 | use crate::{error::{BNFCompileError, ParseError}, state_machine::{self, ASTNode, MatchRecord, StateMachineParser, State, StateAction}, To... [INFO] [stdout] | ^^^^^^^^^^ ^^^^ ^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_imports)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused import: `marker::PhantomData` [INFO] [stdout] --> src/state_machine.rs:1:33 [INFO] [stdout] | [INFO] [stdout] 1 | use std::{collections::HashMap, marker::PhantomData}; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:83:14 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `traceback_records` [INFO] [stdout] --> src/state_machine.rs:83:34 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_traceback_records` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `rule_call_record` [INFO] [stdout] --> src/state_machine.rs:83:53 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_rule_call_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `match_record` [INFO] [stdout] --> src/state_machine.rs:83:71 [INFO] [stdout] | [INFO] [stdout] 83 | let (start_rule, tokens, traceback_records, rule_call_record, match_record) = context; [INFO] [stdout] | ^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_match_record` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `start_rule` [INFO] [stdout] --> src/state_machine.rs:129:14 [INFO] [stdout] | [INFO] [stdout] 129 | let (start_rule, tokens, traceback_records, rule_call_records, match_records) = context; [INFO] [stdout] | ^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_start_rule` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: field `value` is never read [INFO] [stdout] --> src/lib.rs:63:13 [INFO] [stdout] | [INFO] [stdout] 61 | struct NumericExpressionToken { [INFO] [stdout] | ---------------------- field in this struct [INFO] [stdout] 62 | token_type: NumericExpressionTokenType, [INFO] [stdout] 63 | value: usize, [INFO] [stdout] | ^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: `NumericExpressionToken` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis [INFO] [stdout] = note: `#[warn(dead_code)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a shared reference to mutable static is discouraged [INFO] [stdout] --> src/lib.rs:54:30 [INFO] [stdout] | [INFO] [stdout] 54 | match unsafe{TOKEN_TYPE_CONVERTER.as_ref().unwrap()}.get(&value) { [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see [INFO] [stdout] = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives [INFO] [stdout] = note: `#[warn(static_mut_refs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.59s [INFO] running `Command { std: "docker" "inspect" "d2e99cedb02e66160263680fd6837a895601f4db71410c91b25aa5ac66b90aa9", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d2e99cedb02e66160263680fd6837a895601f4db71410c91b25aa5ac66b90aa9", kill_on_drop: false }` [INFO] [stdout] d2e99cedb02e66160263680fd6837a895601f4db71410c91b25aa5ac66b90aa9