[INFO] fetching crate bootloader-x86_64-bios-stage-2 0.11.4...
[INFO] checking bootloader-x86_64-bios-stage-2-0.11.4 against master#b3bd7058c139e71bae0862ef8f8ac936208873e9 for pr-123752
[INFO] extracting crate bootloader-x86_64-bios-stage-2 0.11.4 into /workspace/builds/worker-4-tc1/source
[INFO] validating manifest of crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 on toolchain b3bd7058c139e71bae0862ef8f8ac936208873e9
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b3bd7058c139e71bae0862ef8f8ac936208873e9" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] finished tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] tweaked toml for crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 written to /workspace/builds/worker-4-tc1/source/Cargo.toml
[INFO] crate crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+b3bd7058c139e71bae0862ef8f8ac936208873e9" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded mbr-nostd v0.1.0
[INFO] [stderr]   Downloaded bootloader-x86_64-bios-common v0.11.4
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+b3bd7058c139e71bae0862ef8f8ac936208873e9" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 83505feffec4acddaee6d910e896048247e6e81016fb9d677dafb03431c79ee8
[INFO] running `Command { std: "docker" "start" "-a" "83505feffec4acddaee6d910e896048247e6e81016fb9d677dafb03431c79ee8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "83505feffec4acddaee6d910e896048247e6e81016fb9d677dafb03431c79ee8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "83505feffec4acddaee6d910e896048247e6e81016fb9d677dafb03431c79ee8", kill_on_drop: false }`
[INFO] [stdout] 83505feffec4acddaee6d910e896048247e6e81016fb9d677dafb03431c79ee8
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+b3bd7058c139e71bae0862ef8f8ac936208873e9" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f7869d40a66254f90b432d65e42d24b9e0a00be1c3260c32625c72972ce8f752
[INFO] running `Command { std: "docker" "start" "-a" "f7869d40a66254f90b432d65e42d24b9e0a00be1c3260c32625c72972ce8f752", kill_on_drop: false }`
[INFO] [stderr]    Compiling bootloader-x86_64-bios-stage-2 v0.11.4 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking byteorder v1.4.3
[INFO] [stderr]     Checking bootloader-x86_64-bios-common v0.11.4
[INFO] [stderr]     Checking mbr-nostd v0.1.0
[INFO] [stdout] error: `#[panic_handler]` function required, but not found
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: unwinding panics are not supported without std
[INFO] [stdout]   |
[INFO] [stdout]   = help: using nightly cargo, use -Zbuild-std with panic="abort" to avoid unwinding
[INFO] [stdout]   = note: since the core library is usually precompiled with panic="unwind", rebuilding your crate with panic="abort" may not be enough to fix the problem
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 2 previous errors; 2 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bootloader-x86_64-bios-stage-2` (bin "bootloader-x86_64-bios-stage-2") due to 3 previous errors; 2 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: field `index` is never read
[INFO] [stdout]    --> src/fat.rs:246:9
[INFO] [stdout]     |
[INFO] [stdout] 245 | pub struct Cluster {
[INFO] [stdout]     |            ------- field in this struct
[INFO] [stdout] 246 |     pub index: u32,
[INFO] [stdout]     |         ^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `Cluster` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 3 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "f7869d40a66254f90b432d65e42d24b9e0a00be1c3260c32625c72972ce8f752", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f7869d40a66254f90b432d65e42d24b9e0a00be1c3260c32625c72972ce8f752", kill_on_drop: false }`
[INFO] [stdout] f7869d40a66254f90b432d65e42d24b9e0a00be1c3260c32625c72972ce8f752
[INFO] checking bootloader-x86_64-bios-stage-2-0.11.4 against try#57fe1b734d9ff1c8a92bda60b85506b9648158d3 for pr-123752
[INFO] extracting crate bootloader-x86_64-bios-stage-2 0.11.4 into /workspace/builds/worker-4-tc2/source
[INFO] validating manifest of crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 on toolchain 57fe1b734d9ff1c8a92bda60b85506b9648158d3
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+57fe1b734d9ff1c8a92bda60b85506b9648158d3" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] finished tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] tweaked toml for crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 written to /workspace/builds/worker-4-tc2/source/Cargo.toml
[INFO] crate crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+57fe1b734d9ff1c8a92bda60b85506b9648158d3" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+57fe1b734d9ff1c8a92bda60b85506b9648158d3" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 650db87833f8b862dfb502e5823e73115bbe0547575a2b3dff1c5c363fa65460
[INFO] running `Command { std: "docker" "start" "-a" "650db87833f8b862dfb502e5823e73115bbe0547575a2b3dff1c5c363fa65460", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "650db87833f8b862dfb502e5823e73115bbe0547575a2b3dff1c5c363fa65460", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "650db87833f8b862dfb502e5823e73115bbe0547575a2b3dff1c5c363fa65460", kill_on_drop: false }`
[INFO] [stdout] 650db87833f8b862dfb502e5823e73115bbe0547575a2b3dff1c5c363fa65460
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+57fe1b734d9ff1c8a92bda60b85506b9648158d3" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 5225f194c51202bc0b6dbc77d5ac46bfc63f51f9843310697a6b4ee927e979f8
[INFO] running `Command { std: "docker" "start" "-a" "5225f194c51202bc0b6dbc77d5ac46bfc63f51f9843310697a6b4ee927e979f8", kill_on_drop: false }`
[INFO] [stderr]     Checking byteorder v1.4.3
[INFO] [stderr]    Compiling bootloader-x86_64-bios-stage-2 v0.11.4 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking bootloader-x86_64-bios-common v0.11.4
[INFO] [stderr]     Checking mbr-nostd v0.1.0
[INFO] [stdout] error: `#[panic_handler]` function required, but not found
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: unwinding panics are not supported without std
[INFO] [stdout]   |
[INFO] [stdout]   = help: using nightly cargo, use -Zbuild-std with panic="abort" to avoid unwinding
[INFO] [stdout]   = note: since the core library is usually precompiled with panic="unwind", rebuilding your crate with panic="abort" may not be enough to fix the problem
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 2 previous errors; 2 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bootloader-x86_64-bios-stage-2` (bin "bootloader-x86_64-bios-stage-2") due to 3 previous errors; 2 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: field `index` is never read
[INFO] [stdout]    --> src/fat.rs:246:9
[INFO] [stdout]     |
[INFO] [stdout] 245 | pub struct Cluster {
[INFO] [stdout]     |            ------- field in this struct
[INFO] [stdout] 246 |     pub index: u32,
[INFO] [stdout]     |         ^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `Cluster` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 3 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "5225f194c51202bc0b6dbc77d5ac46bfc63f51f9843310697a6b4ee927e979f8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "5225f194c51202bc0b6dbc77d5ac46bfc63f51f9843310697a6b4ee927e979f8", kill_on_drop: false }`
[INFO] [stdout] 5225f194c51202bc0b6dbc77d5ac46bfc63f51f9843310697a6b4ee927e979f8
