[INFO] cloning repository https://github.com/hexagonal-sun/rust-alignment-error
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/hexagonal-sun/rust-alignment-error" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhexagonal-sun%2Frust-alignment-error", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhexagonal-sun%2Frust-alignment-error'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 19f9760f387c705ab218e7fab57fc80f93539289
[INFO] checking hexagonal-sun/rust-alignment-error against master#8a65ee08296b36342bf7c3cdc15312ccbc357227 for pr-142704
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fhexagonal-sun%2Frust-alignment-error" "/workspace/builds/worker-6-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-6-tc1/source'...
[INFO] [stderr] done.
[INFO] validating manifest of git repo https://github.com/hexagonal-sun/rust-alignment-error on toolchain 8a65ee08296b36342bf7c3cdc15312ccbc357227
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking git repo https://github.com/hexagonal-sun/rust-alignment-error
[INFO] finished tweaking git repo https://github.com/hexagonal-sun/rust-alignment-error
[INFO] tweaked toml for git repo https://github.com/hexagonal-sun/rust-alignment-error written to /workspace/builds/worker-6-tc1/source/Cargo.toml
[INFO] crate git repo https://github.com/hexagonal-sun/rust-alignment-error already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 5f3842550d858620cf129f93c4d0358d617f6c8f5425f04e4c11e6084746ebd9
[INFO] running `Command { std: "docker" "start" "-a" "5f3842550d858620cf129f93c4d0358d617f6c8f5425f04e4c11e6084746ebd9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "5f3842550d858620cf129f93c4d0358d617f6c8f5425f04e4c11e6084746ebd9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "5f3842550d858620cf129f93c4d0358d617f6c8f5425f04e4c11e6084746ebd9", kill_on_drop: false }`
[INFO] [stdout] 5f3842550d858620cf129f93c4d0358d617f6c8f5425f04e4c11e6084746ebd9
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-6-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 62a489d3554e9f925578f813c2b0e0501e52e48e0d51b29f0bad328266de7a1d
[INFO] running `Command { std: "docker" "start" "-a" "62a489d3554e9f925578f813c2b0e0501e52e48e0d51b29f0bad328266de7a1d", kill_on_drop: false }`
[INFO] [stderr]     Checking alignment-error v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: field `stack_class` is never read
[INFO] [stdout]   --> src/main.rs:40:5
[INFO] [stdout]    |
[INFO] [stdout] 38 | struct HeapVisitor<'a> {
[INFO] [stdout]    |        ----------- field in this struct
[INFO] [stdout] 39 |     stack: Vec<(&'a Ast, Frame<'a>)>,
[INFO] [stdout] 40 |     stack_class: Vec<ClassInduct<'a>>,
[INFO] [stdout]    |     ^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variants `Group` and `Alternation` are never constructed
[INFO] [stdout]   --> src/main.rs:44:5
[INFO] [stdout]    |
[INFO] [stdout] 43 | enum Frame<'a> {
[INFO] [stdout]    |      ----- variants in this enum
[INFO] [stdout] 44 |     Group(&'a Group),
[INFO] [stdout]    |     ^^^^^
[INFO] [stdout] 45 |     Concat { head: &'a Ast, tail: &'a [Ast] },
[INFO] [stdout] 46 |     Alternation { head: &'a Ast, tail: &'a [Ast] },
[INFO] [stdout]    |     ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `BinaryOp` is never constructed
[INFO] [stdout]   --> src/main.rs:50:5
[INFO] [stdout]    |
[INFO] [stdout] 49 | enum ClassInduct<'a> {
[INFO] [stdout]    |      ----------- variant in this enum
[INFO] [stdout] 50 |     BinaryOp(&'a ClassSetBinaryOp),
[INFO] [stdout]    |     ^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/main.rs:11:44
[INFO] [stdout]    |
[INFO] [stdout] 11 |         static mut PTR: *mut u8 = unsafe { MEM.as_mut_ptr() };
[INFO] [stdout]    |                                            ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `stack_class` is never read
[INFO] [stdout]   --> src/main.rs:40:5
[INFO] [stdout]    |
[INFO] [stdout] 38 | struct HeapVisitor<'a> {
[INFO] [stdout]    |        ----------- field in this struct
[INFO] [stdout] 39 |     stack: Vec<(&'a Ast, Frame<'a>)>,
[INFO] [stdout] 40 |     stack_class: Vec<ClassInduct<'a>>,
[INFO] [stdout]    |     ^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variants `Group` and `Alternation` are never constructed
[INFO] [stdout]   --> src/main.rs:44:5
[INFO] [stdout]    |
[INFO] [stdout] 43 | enum Frame<'a> {
[INFO] [stdout]    |      ----- variants in this enum
[INFO] [stdout] 44 |     Group(&'a Group),
[INFO] [stdout]    |     ^^^^^
[INFO] [stdout] 45 |     Concat { head: &'a Ast, tail: &'a [Ast] },
[INFO] [stdout] 46 |     Alternation { head: &'a Ast, tail: &'a [Ast] },
[INFO] [stdout]    |     ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `BinaryOp` is never constructed
[INFO] [stdout]   --> src/main.rs:50:5
[INFO] [stdout]    |
[INFO] [stdout] 49 | enum ClassInduct<'a> {
[INFO] [stdout]    |      ----------- variant in this enum
[INFO] [stdout] 50 |     BinaryOp(&'a ClassSetBinaryOp),
[INFO] [stdout]    |     ^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/main.rs:11:44
[INFO] [stdout]    |
[INFO] [stdout] 11 |         static mut PTR: *mut u8 = unsafe { MEM.as_mut_ptr() };
[INFO] [stdout]    |                                            ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 0.19s
[INFO] running `Command { std: "docker" "inspect" "62a489d3554e9f925578f813c2b0e0501e52e48e0d51b29f0bad328266de7a1d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "62a489d3554e9f925578f813c2b0e0501e52e48e0d51b29f0bad328266de7a1d", kill_on_drop: false }`
[INFO] [stdout] 62a489d3554e9f925578f813c2b0e0501e52e48e0d51b29f0bad328266de7a1d
