[INFO] fetching crate bootloader-x86_64-bios-stage-2 0.11.4...
[INFO] checking bootloader-x86_64-bios-stage-2-0.11.4 against master#c2f2db79ca3024f68d22b45aa22b570775c2c4ad for pr-124157
[INFO] extracting crate bootloader-x86_64-bios-stage-2 0.11.4 into /workspace/builds/worker-7-tc1/source
[INFO] validating manifest of crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 on toolchain c2f2db79ca3024f68d22b45aa22b570775c2c4ad
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] finished tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] tweaked toml for crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 written to /workspace/builds/worker-7-tc1/source/Cargo.toml
[INFO] crate crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded mbr-nostd v0.1.0
[INFO] [stderr]   Downloaded bootloader-x86_64-bios-common v0.11.4
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 4a4d17194b4e07e3f1f248f099d07b4904c27a0ce85e4cba529111597ecd0245
[INFO] running `Command { std: "docker" "start" "-a" "4a4d17194b4e07e3f1f248f099d07b4904c27a0ce85e4cba529111597ecd0245", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "4a4d17194b4e07e3f1f248f099d07b4904c27a0ce85e4cba529111597ecd0245", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "4a4d17194b4e07e3f1f248f099d07b4904c27a0ce85e4cba529111597ecd0245", kill_on_drop: false }`
[INFO] [stdout] 4a4d17194b4e07e3f1f248f099d07b4904c27a0ce85e4cba529111597ecd0245
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 0ef9ddd9a23ac711a1e7adde6ffc6504d45bf563edcffac0d4d4b09c32e75d37
[INFO] running `Command { std: "docker" "start" "-a" "0ef9ddd9a23ac711a1e7adde6ffc6504d45bf563edcffac0d4d4b09c32e75d37", kill_on_drop: false }`
[INFO] [stderr]    Compiling bootloader-x86_64-bios-stage-2 v0.11.4 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking byteorder v1.4.3
[INFO] [stderr]     Checking bootloader-x86_64-bios-common v0.11.4
[INFO] [stderr]     Checking mbr-nostd v0.1.0
[INFO] [stdout] error: `#[panic_handler]` function required, but not found
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: unwinding panics are not supported without std
[INFO] [stdout]   |
[INFO] [stdout]   = help: using nightly cargo, use -Zbuild-std with panic="abort" to avoid unwinding
[INFO] [stdout]   = note: since the core library is usually precompiled with panic="unwind", rebuilding your crate with panic="abort" may not be enough to fix the problem
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 2 previous errors; 2 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bootloader-x86_64-bios-stage-2` (bin "bootloader-x86_64-bios-stage-2") due to 3 previous errors; 2 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: field `index` is never read
[INFO] [stdout]    --> src/fat.rs:246:9
[INFO] [stdout]     |
[INFO] [stdout] 245 | pub struct Cluster {
[INFO] [stdout]     |            ------- field in this struct
[INFO] [stdout] 246 |     pub index: u32,
[INFO] [stdout]     |         ^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `Cluster` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 3 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "0ef9ddd9a23ac711a1e7adde6ffc6504d45bf563edcffac0d4d4b09c32e75d37", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "0ef9ddd9a23ac711a1e7adde6ffc6504d45bf563edcffac0d4d4b09c32e75d37", kill_on_drop: false }`
[INFO] [stdout] 0ef9ddd9a23ac711a1e7adde6ffc6504d45bf563edcffac0d4d4b09c32e75d37
[INFO] checking bootloader-x86_64-bios-stage-2-0.11.4 against try#9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88 for pr-124157
[INFO] extracting crate bootloader-x86_64-bios-stage-2 0.11.4 into /workspace/builds/worker-7-tc2/source
[INFO] validating manifest of crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 on toolchain 9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] finished tweaking crates.io crate bootloader-x86_64-bios-stage-2 0.11.4
[INFO] tweaked toml for crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 written to /workspace/builds/worker-7-tc2/source/Cargo.toml
[INFO] crate crates.io crate bootloader-x86_64-bios-stage-2 0.11.4 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 6916721a3c7e8bd0fc81f94b6624f6903e9c274a85fab264d79efc44e69e5e7d
[INFO] running `Command { std: "docker" "start" "-a" "6916721a3c7e8bd0fc81f94b6624f6903e9c274a85fab264d79efc44e69e5e7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "6916721a3c7e8bd0fc81f94b6624f6903e9c274a85fab264d79efc44e69e5e7d", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "6916721a3c7e8bd0fc81f94b6624f6903e9c274a85fab264d79efc44e69e5e7d", kill_on_drop: false }`
[INFO] [stdout] 6916721a3c7e8bd0fc81f94b6624f6903e9c274a85fab264d79efc44e69e5e7d
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-7-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+9c7b5f5b6b8ec32bbbcf9f07fc0e5208da6c5f88" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] e1304c4d7b74caabd1d2ea98b7988f950a3eb3d39ef282781a2ccc43c0329a57
[INFO] running `Command { std: "docker" "start" "-a" "e1304c4d7b74caabd1d2ea98b7988f950a3eb3d39ef282781a2ccc43c0329a57", kill_on_drop: false }`
[INFO] [stderr]    Compiling bootloader-x86_64-bios-stage-2 v0.11.4 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking byteorder v1.4.3
[INFO] [stderr]     Checking bootloader-x86_64-bios-common v0.11.4
[INFO] [stderr]     Checking mbr-nostd v0.1.0
[INFO] [stdout] error: `#[panic_handler]` function required, but not found
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: unwinding panics are not supported without std
[INFO] [stdout]   |
[INFO] [stdout]   = help: using nightly cargo, use -Zbuild-std with panic="abort" to avoid unwinding
[INFO] [stdout]   = note: since the core library is usually precompiled with panic="unwind", rebuilding your crate with panic="abort" may not be enough to fix the problem
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/disk.rs:17:28
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { &mut TMP_BUF };
[INFO] [stdout]    |                            ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout]    = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 17 |         let buf = unsafe { addr_of_mut!(TMP_BUF) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]   --> src/main.rs:90:32
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { &mut DISK_BUFFER };
[INFO] [stdout]    |                                ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: this will be a hard error in the 2024 edition
[INFO] [stdout]    = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior
[INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 90 |     let disk_buffer = unsafe { addr_of_mut!(DISK_BUFFER) };
[INFO] [stdout]    |                                ~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 2 previous errors; 2 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bootloader-x86_64-bios-stage-2` (bin "bootloader-x86_64-bios-stage-2") due to 3 previous errors; 2 warnings emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: field `index` is never read
[INFO] [stdout]    --> src/fat.rs:246:9
[INFO] [stdout]     |
[INFO] [stdout] 245 | pub struct Cluster {
[INFO] [stdout]     |            ------- field in this struct
[INFO] [stdout] 246 |     pub index: u32,
[INFO] [stdout]     |         ^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `Cluster` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 3 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "e1304c4d7b74caabd1d2ea98b7988f950a3eb3d39ef282781a2ccc43c0329a57", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "e1304c4d7b74caabd1d2ea98b7988f950a3eb3d39ef282781a2ccc43c0329a57", kill_on_drop: false }`
[INFO] [stdout] e1304c4d7b74caabd1d2ea98b7988f950a3eb3d39ef282781a2ccc43c0329a57
