[INFO] fetching crate bztree 0.2.0...
[INFO] checking bztree-0.2.0 against master#4d1bd0db7f489b22c6d8aa2385937a95412c015b for pr-114682
[INFO] extracting crate bztree 0.2.0 into /workspace/builds/worker-0-tc1/source
[INFO] validating manifest of crates.io crate bztree 0.2.0 on toolchain 4d1bd0db7f489b22c6d8aa2385937a95412c015b
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+4d1bd0db7f489b22c6d8aa2385937a95412c015b" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bztree 0.2.0
[INFO] finished tweaking crates.io crate bztree 0.2.0
[INFO] tweaked toml for crates.io crate bztree 0.2.0 written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+4d1bd0db7f489b22c6d8aa2385937a95412c015b" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+4d1bd0db7f489b22c6d8aa2385937a95412c015b" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded csv-core v0.1.11
[INFO] [stderr]   Downloaded criterion-plot v0.4.5
[INFO] [stderr]   Downloaded fs_extra v1.3.0
[INFO] [stderr]   Downloaded jemallocator v0.3.2
[INFO] [stderr]   Downloaded criterion v0.3.6
[INFO] [stderr]   Downloaded csv v1.3.0
[INFO] [stderr]   Downloaded jemalloc-sys v0.3.2
[INFO] [stderr]   Downloaded mwcas v0.2.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+4d1bd0db7f489b22c6d8aa2385937a95412c015b" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] afa4ad07c834087538a954a45b2875e972266285cfecef9f39f5629d4b8cbc0b
[INFO] running `Command { std: "docker" "start" "-a" "afa4ad07c834087538a954a45b2875e972266285cfecef9f39f5629d4b8cbc0b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "afa4ad07c834087538a954a45b2875e972266285cfecef9f39f5629d4b8cbc0b", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "afa4ad07c834087538a954a45b2875e972266285cfecef9f39f5629d4b8cbc0b", kill_on_drop: false }`
[INFO] [stdout] afa4ad07c834087538a954a45b2875e972266285cfecef9f39f5629d4b8cbc0b
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+4d1bd0db7f489b22c6d8aa2385937a95412c015b" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 901cb8b28a85bd1aa885e8fff84600d67923b2d5c17e5e4ea5ef6fc24ecd1f7d
[INFO] running `Command { std: "docker" "start" "-a" "901cb8b28a85bd1aa885e8fff84600d67923b2d5c17e5e4ea5ef6fc24ecd1f7d", kill_on_drop: false }`
[INFO] [stderr]     Checking crossbeam-epoch v0.9.16
[INFO] [stderr]    Compiling libc v0.2.151
[INFO] [stderr]    Compiling num-traits v0.2.17
[INFO] [stderr]    Compiling fs_extra v1.3.0
[INFO] [stderr]     Checking memchr v2.6.4
[INFO] [stderr]     Checking textwrap v0.11.0
[INFO] [stderr]     Checking serde_json v1.0.108
[INFO] [stderr]     Checking serde_cbor v0.11.2
[INFO] [stderr]     Checking clap v2.34.0
[INFO] [stderr]     Checking crossbeam-deque v0.8.4
[INFO] [stderr]     Checking mwcas v0.2.0
[INFO] [stderr]     Checking rayon-core v1.12.0
[INFO] [stderr]     Checking criterion-plot v0.4.5
[INFO] [stderr]     Checking csv-core v0.1.11
[INFO] [stderr]    Compiling cc v1.0.83
[INFO] [stderr]     Checking atty v0.2.14
[INFO] [stderr]     Checking num_cpus v1.16.0
[INFO] [stderr]     Checking csv v1.3.0
[INFO] [stderr]     Checking tinytemplate v1.2.1
[INFO] [stderr]     Checking bztree v0.2.0 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking rayon v1.8.0
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 180 |         let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: `#[deny(invalid_reference_casting)]` on by default
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 226 |         let entry = &mut deref_mut!(self).data_block[kv_index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 325 |             let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                              ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 888 |         let self_mut = deref_mut!(self);
[INFO] [stdout]     |                        ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 4 previous errors
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bztree` (lib) due to 5 previous errors
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] running `Command { std: "docker" "inspect" "901cb8b28a85bd1aa885e8fff84600d67923b2d5c17e5e4ea5ef6fc24ecd1f7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "901cb8b28a85bd1aa885e8fff84600d67923b2d5c17e5e4ea5ef6fc24ecd1f7d", kill_on_drop: false }`
[INFO] [stdout] 901cb8b28a85bd1aa885e8fff84600d67923b2d5c17e5e4ea5ef6fc24ecd1f7d
[INFO] checking bztree-0.2.0 against try#785364c7e5e0804473a3fddfb579798ea14e3493 for pr-114682
[INFO] extracting crate bztree 0.2.0 into /workspace/builds/worker-0-tc2/source
[INFO] validating manifest of crates.io crate bztree 0.2.0 on toolchain 785364c7e5e0804473a3fddfb579798ea14e3493
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+785364c7e5e0804473a3fddfb579798ea14e3493" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bztree 0.2.0
[INFO] finished tweaking crates.io crate bztree 0.2.0
[INFO] tweaked toml for crates.io crate bztree 0.2.0 written to /workspace/builds/worker-0-tc2/source/Cargo.toml
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+785364c7e5e0804473a3fddfb579798ea14e3493" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+785364c7e5e0804473a3fddfb579798ea14e3493" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+785364c7e5e0804473a3fddfb579798ea14e3493" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 86d8006ce7b3e0bbc86de73d7b7a22a4c1b78587599ff1c3fd0b322942b2eb7e
[INFO] running `Command { std: "docker" "start" "-a" "86d8006ce7b3e0bbc86de73d7b7a22a4c1b78587599ff1c3fd0b322942b2eb7e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "86d8006ce7b3e0bbc86de73d7b7a22a4c1b78587599ff1c3fd0b322942b2eb7e", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "86d8006ce7b3e0bbc86de73d7b7a22a4c1b78587599ff1c3fd0b322942b2eb7e", kill_on_drop: false }`
[INFO] [stdout] 86d8006ce7b3e0bbc86de73d7b7a22a4c1b78587599ff1c3fd0b322942b2eb7e
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+785364c7e5e0804473a3fddfb579798ea14e3493" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 7ed03bb1b64df18fbd91fc828e3e32682a491c5d21e8af7ec04255503aa517cf
[INFO] running `Command { std: "docker" "start" "-a" "7ed03bb1b64df18fbd91fc828e3e32682a491c5d21e8af7ec04255503aa517cf", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.151
[INFO] [stderr]    Compiling num-traits v0.2.17
[INFO] [stderr]    Compiling fs_extra v1.3.0
[INFO] [stderr]     Checking crossbeam-epoch v0.9.16
[INFO] [stderr]     Checking memchr v2.6.4
[INFO] [stderr]     Checking textwrap v0.11.0
[INFO] [stderr]     Checking serde_json v1.0.108
[INFO] [stderr]     Checking criterion-plot v0.4.5
[INFO] [stderr]     Checking clap v2.34.0
[INFO] [stderr]     Checking crossbeam-deque v0.8.4
[INFO] [stderr]     Checking mwcas v0.2.0
[INFO] [stderr]     Checking serde_cbor v0.11.2
[INFO] [stderr]     Checking atty v0.2.14
[INFO] [stderr]     Checking num_cpus v1.16.0
[INFO] [stderr]     Checking rayon-core v1.12.0
[INFO] [stderr]     Checking bztree v0.2.0 (/opt/rustwide/workdir)
[INFO] [stderr]    Compiling cc v1.0.83
[INFO] [stderr]     Checking tinytemplate v1.2.1
[INFO] [stderr]     Checking csv-core v0.1.11
[INFO] [stderr]     Checking csv v1.3.0
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 180 |         let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: `#[deny(invalid_reference_casting)]` on by default
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 226 |         let entry = &mut deref_mut!(self).data_block[kv_index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 325 |             let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                              ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 888 |         let self_mut = deref_mut!(self);
[INFO] [stdout]     |                        ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 4 previous errors
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bztree` (lib) due to 5 previous errors
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] running `Command { std: "docker" "inspect" "7ed03bb1b64df18fbd91fc828e3e32682a491c5d21e8af7ec04255503aa517cf", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "7ed03bb1b64df18fbd91fc828e3e32682a491c5d21e8af7ec04255503aa517cf", kill_on_drop: false }`
[INFO] [stdout] 7ed03bb1b64df18fbd91fc828e3e32682a491c5d21e8af7ec04255503aa517cf
