[INFO] fetching crate vk-mem-erupt 0.2.4... [INFO] building vk-mem-erupt-0.2.4 against master#11663cd3bfefef7d34e8f0892c250bf698049392+rustflags=-Dtail-expr-drop-order for pr-134523 [INFO] extracting crate vk-mem-erupt 0.2.4 into /workspace/builds/worker-2-tc1/source [INFO] validating manifest of crates.io crate vk-mem-erupt 0.2.4 on toolchain 11663cd3bfefef7d34e8f0892c250bf698049392 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate vk-mem-erupt 0.2.4 [INFO] finished tweaking crates.io crate vk-mem-erupt 0.2.4 [INFO] tweaked toml for crates.io crate vk-mem-erupt 0.2.4 written to /workspace/builds/worker-2-tc1/source/Cargo.toml [INFO] crate crates.io crate vk-mem-erupt 0.2.4 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded backtrace v0.3.62 [INFO] [stderr] Downloaded raw-window-metal v0.1.2 [INFO] [stderr] Downloaded libloading v0.7.1 [INFO] [stderr] Downloaded core-graphics v0.22.2 [INFO] [stderr] Downloaded erupt v0.20.0+190 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] d94a42f73e58bf842c3b9482f02f8f588a3e7dfd5f525854bca25bd1662e0be3 [INFO] running `Command { std: "docker" "start" "-a" "d94a42f73e58bf842c3b9482f02f8f588a3e7dfd5f525854bca25bd1662e0be3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "d94a42f73e58bf842c3b9482f02f8f588a3e7dfd5f525854bca25bd1662e0be3", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d94a42f73e58bf842c3b9482f02f8f588a3e7dfd5f525854bca25bd1662e0be3", kill_on_drop: false }` [INFO] [stdout] d94a42f73e58bf842c3b9482f02f8f588a3e7dfd5f525854bca25bd1662e0be3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "build" "--frozen" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] d100b1ec1329ab5f71024c21a3835cd8b02987df44e00271f123c7c30d0b51ad [INFO] running `Command { std: "docker" "start" "-a" "d100b1ec1329ab5f71024c21a3835cd8b02987df44e00271f123c7c30d0b51ad", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.105 [INFO] [stderr] Compiling cc v1.0.71 [INFO] [stderr] Compiling libloading v0.7.1 [INFO] [stderr] Compiling smallvec v1.7.0 [INFO] [stderr] Compiling vk-mem-erupt v0.2.4 (/opt/rustwide/workdir) [INFO] [stderr] Compiling raw-window-handle v0.3.3 [INFO] [stderr] Compiling erupt v0.20.0+190 [INFO] [stderr] warning: vk-mem-erupt@0.2.4: In file included from wrapper/vma_lib.cpp:2: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'virtual bool VmaBlockMetadata_Generic::Validate() const': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:9457:40: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 9457 | VMA_VALIDATE(subAlloc.size >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:6834:38: note: in definition of macro 'VMA_VALIDATE' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 6834 | #define VMA_VALIDATE(cond) do { if(!(cond)) { \ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'bool VmaBlockMetadata_Linear::CreateAllocationRequest_UpperAddress(uint32_t, uint32_t, VkDeviceSize, VkDeviceSize, VkDeviceSize, VmaSuballocationType, bool, uint32_t, VmaAllocationRequest*)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:11333:25: warning: comparison of unsigned expression in '< 0' is always false [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 11333 | if(resultOffset < VMA_DEBUG_MARGIN) [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: In file included from /usr/include/c++/11/cassert:44, [INFO] [stderr] warning: vk-mem-erupt@0.2.4: from vendor/include/vk_mem_alloc.h:4155, [INFO] [stderr] warning: vk-mem-erupt@0.2.4: from wrapper/vma_lib.cpp:2: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'VkResult VmaDeviceMemoryBlock::WriteMagicValueAroundAllocation(VmaAllocator, VkDeviceSize, VkDeviceSize)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12823:28: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12823 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12823:5: note: in expansion of macro 'VMA_ASSERT' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12823 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~~~~~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'VkResult VmaDeviceMemoryBlock::ValidateMagicValueAroundAllocation(VmaAllocator, VkDeviceSize, VkDeviceSize)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12843:28: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12843 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12843:5: note: in expansion of macro 'VMA_ASSERT' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12843 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~~~~~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: At global scope: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: cc1plus: note: unrecognized command-line option '-Wno-unused-private-field' may have been intended to silence earlier diagnostics [INFO] [stdout] warning: unexpected `cfg` condition value: `cargo-clippy` [INFO] [stdout] --> src/ffi.rs:4:13 [INFO] [stdout] | [INFO] [stdout] 4 | #![cfg_attr(feature = "cargo-clippy", allow(clippy::unreadable_literal))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `bindgen`, `default`, `failure`, `generate_bindings`, `link_vulkan`, and `recording` [INFO] [stdout] = help: consider adding `cargo-clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 18.45s [INFO] running `Command { std: "docker" "inspect" "d100b1ec1329ab5f71024c21a3835cd8b02987df44e00271f123c7c30d0b51ad", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "d100b1ec1329ab5f71024c21a3835cd8b02987df44e00271f123c7c30d0b51ad", kill_on_drop: false }` [INFO] [stdout] d100b1ec1329ab5f71024c21a3835cd8b02987df44e00271f123c7c30d0b51ad [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Dtail-expr-drop-order" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:f3a9d4ad9d972b27faf3965f35b62e55ba32bbce8f20bc8fe909558a86702fde" "/opt/rustwide/cargo-home/bin/cargo" "+11663cd3bfefef7d34e8f0892c250bf698049392" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 23afc161145d05755cf2fb3aef566e3ff6977d901e57c86f0288e8a4e752b7bf [INFO] running `Command { std: "docker" "start" "-a" "23afc161145d05755cf2fb3aef566e3ff6977d901e57c86f0288e8a4e752b7bf", kill_on_drop: false }` [INFO] [stderr] warning: vk-mem-erupt@0.2.4: In file included from wrapper/vma_lib.cpp:2: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'virtual bool VmaBlockMetadata_Generic::Validate() const': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:9457:40: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 9457 | VMA_VALIDATE(subAlloc.size >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:6834:38: note: in definition of macro 'VMA_VALIDATE' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 6834 | #define VMA_VALIDATE(cond) do { if(!(cond)) { \ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'bool VmaBlockMetadata_Linear::CreateAllocationRequest_UpperAddress(uint32_t, uint32_t, VkDeviceSize, VkDeviceSize, VkDeviceSize, VmaSuballocationType, bool, uint32_t, VmaAllocationRequest*)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:11333:25: warning: comparison of unsigned expression in '< 0' is always false [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 11333 | if(resultOffset < VMA_DEBUG_MARGIN) [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: In file included from /usr/include/c++/11/cassert:44, [INFO] [stdout] warning: unexpected `cfg` condition value: `cargo-clippy` [INFO] [stdout] --> src/ffi.rs:4:13 [INFO] [stdout] | [INFO] [stdout] 4 | #![cfg_attr(feature = "cargo-clippy", allow(clippy::unreadable_literal))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `bindgen`, `default`, `failure`, `generate_bindings`, `link_vulkan`, and `recording` [INFO] [stdout] = help: consider adding `cargo-clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: from vendor/include/vk_mem_alloc.h:4155, [INFO] [stderr] warning: vk-mem-erupt@0.2.4: from wrapper/vma_lib.cpp:2: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'VkResult VmaDeviceMemoryBlock::WriteMagicValueAroundAllocation(VmaAllocator, VkDeviceSize, VkDeviceSize)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12823:28: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12823 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12823:5: note: in expansion of macro 'VMA_ASSERT' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12823 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~~~~~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h: In member function 'VkResult VmaDeviceMemoryBlock::ValidateMagicValueAroundAllocation(VmaAllocator, VkDeviceSize, VkDeviceSize)': [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12843:28: warning: comparison of unsigned expression in '>= 0' is always true [-Wtype-limits] [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12843 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: vendor/include/vk_mem_alloc.h:12843:5: note: in expansion of macro 'VMA_ASSERT' [INFO] [stderr] warning: vk-mem-erupt@0.2.4: 12843 | VMA_ASSERT(allocOffset >= VMA_DEBUG_MARGIN); [INFO] [stderr] warning: vk-mem-erupt@0.2.4: | ^~~~~~~~~~ [INFO] [stderr] warning: vk-mem-erupt@0.2.4: At global scope: [INFO] [stderr] warning: vk-mem-erupt@0.2.4: cc1plus: note: unrecognized command-line option '-Wno-unused-private-field' may have been intended to silence earlier diagnostics [INFO] [stderr] Compiling vk-mem-erupt v0.2.4 (/opt/rustwide/workdir) [INFO] [stdout] warning: unexpected `cfg` condition value: `cargo-clippy` [INFO] [stdout] --> src/ffi.rs:4:13 [INFO] [stdout] | [INFO] [stdout] 4 | #![cfg_attr(feature = "cargo-clippy", allow(clippy::unreadable_literal))] [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: expected values for `feature` are: `bindgen`, `default`, `failure`, `generate_bindings`, `link_vulkan`, and `recording` [INFO] [stdout] = help: consider adding `cargo-clippy` as a feature in `Cargo.toml` [INFO] [stdout] = note: see for more information about checking conditional configuration [INFO] [stdout] = note: `#[warn(unexpected_cfgs)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.70s [INFO] running `Command { std: "docker" "inspect" "23afc161145d05755cf2fb3aef566e3ff6977d901e57c86f0288e8a4e752b7bf", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "23afc161145d05755cf2fb3aef566e3ff6977d901e57c86f0288e8a4e752b7bf", kill_on_drop: false }` [INFO] [stdout] 23afc161145d05755cf2fb3aef566e3ff6977d901e57c86f0288e8a4e752b7bf