[INFO] fetching crate bztree 0.2.0...
[INFO] checking bztree-0.2.0 against master#c2f2db79ca3024f68d22b45aa22b570775c2c4ad for pr-124157
[INFO] extracting crate bztree 0.2.0 into /workspace/builds/worker-0-tc1/source
[INFO] validating manifest of crates.io crate bztree 0.2.0 on toolchain c2f2db79ca3024f68d22b45aa22b570775c2c4ad
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate bztree 0.2.0
[INFO] finished tweaking crates.io crate bztree 0.2.0
[INFO] tweaked toml for crates.io crate bztree 0.2.0 written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]      Locking 84 packages to latest compatible versions
[INFO] [stderr]       Adding bitflags v1.3.2 (latest: v2.5.0)
[INFO] [stderr]       Adding clap v2.34.0 (latest: v4.5.4)
[INFO] [stderr]       Adding criterion v0.3.6 (latest: v0.5.1)
[INFO] [stderr]       Adding criterion-plot v0.4.5 (latest: v0.5.0)
[INFO] [stderr]       Adding half v1.8.3 (latest: v2.4.1)
[INFO] [stderr]       Adding hermit-abi v0.1.19 (latest: v0.3.9)
[INFO] [stderr]       Adding itertools v0.10.5 (latest: v0.12.1)
[INFO] [stderr]       Adding jemalloc-sys v0.3.2 (latest: v0.5.4+5.3.0-patched)
[INFO] [stderr]       Adding jemallocator v0.3.2 (latest: v0.5.4)
[INFO] [stderr]       Adding textwrap v0.11.0 (latest: v0.16.1)
[INFO] [stderr]       Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.0+wasi-0.2.0)
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded jemallocator v0.3.2
[INFO] [stderr]   Downloaded mwcas v0.2.0
[INFO] [stderr]   Downloaded jemalloc-sys v0.3.2
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] fed1d632d5f95a7b65105ba729a167e78fc8f95a7a998087af3cec37d5a1604f
[INFO] running `Command { std: "docker" "start" "-a" "fed1d632d5f95a7b65105ba729a167e78fc8f95a7a998087af3cec37d5a1604f", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "fed1d632d5f95a7b65105ba729a167e78fc8f95a7a998087af3cec37d5a1604f", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "fed1d632d5f95a7b65105ba729a167e78fc8f95a7a998087af3cec37d5a1604f", kill_on_drop: false }`
[INFO] [stdout] fed1d632d5f95a7b65105ba729a167e78fc8f95a7a998087af3cec37d5a1604f
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:99613afd962a8cfa530ec1899472a458bd015a1ab0af876cf7eb06f6006d81ea" "/opt/rustwide/cargo-home/bin/cargo" "+c2f2db79ca3024f68d22b45aa22b570775c2c4ad" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] f442e3b5d6b0e915d52fb1d0a8298f76d05a2536afe1212009bf714c7c35e178
[INFO] running `Command { std: "docker" "start" "-a" "f442e3b5d6b0e915d52fb1d0a8298f76d05a2536afe1212009bf714c7c35e178", kill_on_drop: false }`
[INFO] [stderr]    Compiling fs_extra v1.3.0
[INFO] [stderr]     Checking memchr v2.7.2
[INFO] [stderr]     Checking half v1.8.3
[INFO] [stderr]     Checking textwrap v0.11.0
[INFO] [stderr]     Checking crossbeam-epoch v0.9.18
[INFO] [stderr]     Checking serde_json v1.0.116
[INFO] [stderr]     Checking criterion-plot v0.4.5
[INFO] [stderr]     Checking plotters v0.3.5
[INFO] [stderr]    Compiling serde_derive v1.0.200
[INFO] [stderr]     Checking clap v2.34.0
[INFO] [stderr]     Checking crossbeam-deque v0.8.5
[INFO] [stderr]     Checking mwcas v0.2.0
[INFO] [stderr]     Checking serde_cbor v0.11.2
[INFO] [stderr]    Compiling jemalloc-sys v0.3.2
[INFO] [stderr]     Checking bztree v0.2.0 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking rayon-core v1.12.1
[INFO] [stderr]     Checking csv-core v0.1.11
[INFO] [stderr]     Checking csv v1.3.0
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 180 |         let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: `#[deny(invalid_reference_casting)]` on by default
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 226 |         let entry = &mut deref_mut!(self).data_block[kv_index];
[INFO] [stdout]     |                          ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 325 |             let entry = &mut deref_mut!(self).data_block[index];
[INFO] [stdout]     |                              ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: casting `&T` to `&mut T` is undefined behavior, even if the reference is unused, consider instead using an `UnsafeCell`
[INFO] [stdout]    --> src/node/mod.rs:29:18
[INFO] [stdout]     |
[INFO] [stdout] 29  |         unsafe { &mut *($node as *const Node<K, V> as *mut Node<K, V>) }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 888 |         let self_mut = deref_mut!(self);
[INFO] [stdout]     |                        ---------------- in this macro invocation
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, visit <https://doc.rust-lang.org/book/ch15-05-interior-mutability.html>
[INFO] [stdout]     = note: even for types with interior mutability, the only legal way to obtain a mutable pointer from a shared reference is through `UnsafeCell::get`
[INFO] [stdout]     = note: this error originates in the macro `deref_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error: aborting due to 4 previous errors
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `bztree` (lib) due to 5 previous errors
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] running `Command { std: "docker" "inspect" "f442e3b5d6b0e915d52fb1d0a8298f76d05a2536afe1212009bf714c7c35e178", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "f442e3b5d6b0e915d52fb1d0a8298f76d05a2536afe1212009bf714c7c35e178", kill_on_drop: false }`
[INFO] [stdout] f442e3b5d6b0e915d52fb1d0a8298f76d05a2536afe1212009bf714c7c35e178
